Identity management for wearables should be top priority for IT managers

By Nell Walker
Centrify, the leader in securing enterprise identities against cyberthreats, has announced the results from a survey conducted at the RSA Conference reg...

Centrify, the leader in securing enterprise identities against cyberthreats, has announced the results from a survey conducted at the RSA Conference regarding the prevalence of wearables in the enterprise, and the growing concern they pose for IT security. RSA is taking place this week at the Moscone Centre in San Francisco, US.

First, 69 percent of wearable device owners say they forego login credentials, such as PINs, passwords, fingerprint scanners and voice recognition, to access their devices. 56 percent of wearable owners use their devices to access business apps such as Box, Slack, Trello, Dropbox, Salesforce, Google Docs, Microsoft Office or a combination of these.

Perhaps most alarming, despite the lack of login credentials and ready access to corporate data, 42 percent of wearable owners cite identity theft as their top security concern when it comes to their devices. Lack of IT management and device control comes in second (34 percent) and a general increase in breaches of sensitive work data or information comes in third (22 percent). 

“As wearables become more common in the enterprise, IT departments must take serious steps to protect them as carefully as they do laptops and smartphones,” said Bill Mann, Chief Product Officer for Centrify. “Wearables are deceptively private. Owners may feel that due to their ongoing proximity to the body, they’re less likely to fall into the wrong hands. However, hackers don’t need to take physical possession of a device in order to exploit a hole in security. The best news is that solutions already exist that can easily wrap wearables into the identity management picture.”

About Centrify

Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50. 

 

Follow @ManufacturingGL and @NellWalkerMG

Share

Featured Articles

Managing supply & demand in pharma manufacturing

Pharma manufacturing supply & demand according to John Swift, Head of Supply Chain at Owen Mumford Pharmaceutical Services

Trend Micro on the future of cybersecurity in manufacturing

Bharat Mistry, Technical Director at software developer Trend Micro, explores the evolution of cybersecurity in manufacturing & building a connected world

How industrial manufacturers prioritise product development

Patrick Dalez, Product Business Line Director at Qt Group, discusses the results of a new manufacturing study on how businesses are adapting to the economy

Model N’s Chris Shrope: exploring high-tech in manufacturing

Technology

Infosys: AI & Smart Factories strengthen manufacturing

Technology

Electronics manufacturer Flex on trustworthy ESG data

Procurement & Supply Chain