Josue Fontanez

New Research: Top 10 Identity and Access Management Challenges

As organizations undergo digital transformation, they experience challenges along the way. This is due to the fact that this transformation often requires them to update and/or replace legacy solutions. They also have to implement new ways of securing access from the plethora of devices out there.

We recently fielded a research studywith several hundred respondents worldwide to better understand the top identity and access management challenges that customers are facing.

Below are my top three takeaways from the VMware survey:

Takeaway #1: Most organizations allow end users to access corporate resources other than email from a personal device.

Email is often the first app that many of us think about accessing from our personal devices, but the reality is that we need more than that. The research shows that end users also need access to files and internal websites in order to be productive.

IT professionals should be concerned about the risk of data leakage from users accessing confidential information, whether it be on a file share, Microsoft SharePoint or from internal websites. Since personal devices are often not under management by IT, there is a risk that confidential company information can be copied to personal file services.

[Related: Introducing VMware Identity Manager—Identity Management for the Mobile-Cloud Era]

Takeway #2: BYO is a critical initiative for the majority of organizations.

The majority of organizations have either already developed a bring-your-own (BYO) policy or are in the process of developing one. The reasons for this are clear. Most of us don&#rsquo;t want to go back to the old days, when we could only do work on a corporate device. We want to be able to work anywhere, on any device.

End users also want choice—the choice to pick the device that reflects their work style and personality. Supporting BYO enables organizations to modernize with a flexible, user-friendly approach.

While supporting BYO is user-friendly, organizations need to have a policy that ensures that only the right access is delivered to the right people, on the right device. As we saw in Takeaway #1, most users are doing more than accessing email on their personal devices. It&#rsquo;s not enough to just have a policy—organizations must have the tools in order enable access from any device without compromising IT security.

[Related: VMware Identity Manager—A BYOD Solution Everyone Can Agree On]

Takeway #3: Password management is the top identity and access management challenge.

We&#rsquo;ve all been there before. We waited too long, and our password expired. Or we made a change, and somehow that change didn&#rsquo;t trickle down to all of the various systems we need to access.

Password creation, update and deletion (CRUD) is a real issue with real costs that IT wants to reduce. According to various analysts, password resets handled by the help desk can cost up to $70, and unfortunately for the help desk, a significant percentage of help desk calls have to do with passwords.

IT must look at ways to reduce the impact of password CRUD issues in their organization. This is why it&#rsquo;s so important to have solutions in place that eliminate the help desk call—the main source of cost in the equation. Having self-service tools that are easy to use and integrate with existing systems can alleviate much of the pain here.

[Related: Why the Future of the Digital Workspace Hinges on Identity Management]

Take the Next Step

Click here for the full results.

With these challenges in mind, I encourage you to learn more about what other organizations are experiencing by taking a look at the full summary of the research.

Also, take a look at VMware Workspace ONE, the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. It enables organizations to put employees in the driver&#rsquo;s seat to choose their own devices. IT is empowered with the management capabilities necessary to enable secure delivery of applications to those devices with consumer-grade simplicity.

The post New Research: Top 10 Identity and Access Management Challenges appeared first on VMware End-User Computing Blog.

Read more..

Unify and Simplify Access Control with VMware Workspace ONE

The New Perimeter for Securing Access from any User or Device

Over the last decade, the workforce experienced a phenomenal transformation. This shift, commonly called digital transformation, made it more difficult than ever before to enable secure access to corporate resources. Changes in workstyles, devices and apps—and how end users expect to interact with productivity tools—exacerbated the problem.

In the past, in order for end users to be productive, all work-related tasks had to be done from a company-purchased Windows desktop or laptop with a locked down corporate image. Today, end users work on multiple devices, with various form factors and operating systems. Many of these devices are not managed by IT, so IT cannot trust the device.

With the diversity of devices, end users now need access to Software-as-a-Service (SaaS) apps, native mobile apps, Windows apps and internal web apps, along with legacy and virtualized apps. In fact, we&#rsquo;re at a point where there are more non-Windows apps than Windows apps. With the proliferation of SaaS apps, more and more application resources move outside the walls of the corporate network, and into the cloud.

The workforce has also changed. In the past, organizations only thought of employees and how those users accessed corporate resources. But organizations now need to think about contingent staff, business partners and in some cases even customers.

In 2015, contingent workers on average made up 18% of the total workforce, yet that number is expected to increase to 40% in 2020.

IT needs to think about how to enable secure access to corporate resources for end users not bound by an employee handbook. More than ever before, IT needs to transform how they think about access control and evolve how they solve for these fundamental shifts in the way people work.

IT Needs a New Access Control Layer

Click here to download.

At VMware, we invest a lot of time and effort into thinking about how to enable diverse workstyles that span a broad range of devices and apps. Existing systems for securing access to corporate resources focus on legacy controls: network access control lists, domain membership and only trusting devices with a corporate image. We believe the industry needs to evolve to focus on controlling access based on a new access control layer.

This access control layer is designed to look at the whole picture:

  • Who are you?
  • What do you have access to?
  • Under what conditions will I allow that access?
  • Do I trust the device you&#rsquo;re on?
  • Should I ask for more information?
  • Can I give you limited access to resources?

By looking at the whole picture, IT has peace of mind knowing that access control decisions will be made at the perimeter. Only authorized users will access corporate resources under the conditions that IT has set. This access control layer works across device ownership models, whether the device is corporate-owned, shared or personal.

The VMware Solution to Unify Access Control

At VMware, we have taken to heart this new approach with VMware Workspace ONE. Workspace ONE is a single solution that brings together application access management, unified endpoint management and real-time application delivery into the industry&#rsquo;s only solution for delivering secure digital workspaces to any user on any device.

[Related: Breaking News! New VMware Workspace ONE & AirWatch Product Innovations]

In order to unify access control, we focus on four core areas:

  • Contextual access control: With Workspace ONE we realize that access control decisions must be dynamic, based on context. We built a powerful access control engine based on data across users, devices, applications and network location. That information is then used to make contextual decisions on what a user can access and under what conditions. Based on context, IT can also decide to elevate security (perhaps by asking for a second factor of authentication) or management (by asking the end user to enroll in additional management).
  • Complete visibility into device posture: We take access control decisions to new heights when we combine our access control engine with the information that is delivered by VMware AirWatch. AirWatch, the market-leading enterprise mobility management solution that is part of Workspace ONE, enables us to understand the posture of a device. For example, we can look at whether or not a device has a management profile, a device passcode, the right OS version, application whitelisting and whether it has been jailbroken/rooted.
  • Step-up authentication: Because we baked in VMware Verify, a two-factor authentication (2FA) solution in Workspace ONE, organizations can configure 2FA to all corporate applications or more commonly, to specific applications containing sensitive corporate information. As an example, that means that IT can require 2FA when an end user launches Salesforce on a mobile device from an untrusted network. And with new support for mobile-push authentication to an Apple Watch, that second factor is just a touch away!

[Related: Introducing VMware Verify Two-Factor Authentication]

  • Support for any app and any device: It&#rsquo;s imperative for users to access all of the apps they need to be productive, on the device of their choice. This is critical as end users receive new devices over the holidays, or students start using new devices to start the school year. This also includes having a single portal to access the various app types they need to do their job. That is also why with our latest release, we announced the new VMware Unified Access Gateway that will now support legacy apps that use Kerberos and HTTP headers.

When we bring all of these pieces together, IT benefits from a single, powerful solution that enables secure access to digital workspaces. They have a single access control layer for enabling and configuring access, with the controls necessary to make contextual decisions based on a broad range of criteria.

End users also get a seamless, award-winningexperience that drives adoption. The end result is that IT can provide a consumer simple experience without sacrificing security and control.

To learn more about Workspace ONE, check out the links below:

  • Workspace ONE product page
  • Workspace ONE Hands On Lab

Because you liked this blog:

  • New! VMware 2016 State of the Digital Workspace Report
  • VMware Wins for Third Time at Global Mobile Awards
  • Challenges & Benefits of Digital Workspace Transformation: Q&A with VMware&#rsquo;s Shankar Iyer

The post Unify and Simplify Access Control with VMware Workspace ONE appeared first on VMware End-User Computing Blog.

Read more..

VMware Wins for Third Time at Global Mobile Awards

At the 2017 Global Mobile Awards, presented at Mobile World Congress, GSMA announced that VMware was selected as a winner for the third time. Following wins in 2014 and 2015, GSMA selected VMware Workspace ONE as the winner of the &#rsquo;Best Mobile Cloud Service or App&#rdquo; which recognizes the organization with the most innovative service or app that best serves the needs of enterprises today.

&#rsquo;Our congratulations to all of the winners and nominees of the GSMA&#rsquo;s Glomo Awards at Mobile World Congress this week,” said Michael O&#rsquo;Hara, Chief Marketing Officer, GSMA. “The Glomo Awards truly showcase those companies and individuals that are driving innovation in the rapidly evolving mobile industry. We thank all of our entrants, judges, sponsors and partners for supporting the 2017 Glomo Awards.&#rdquo;

Over the last decade, the workforce has experienced a phenomenal transformation. The workforce now functions in a heterogeneous environment that includes different application types, devices and form factors. Workers expect to be able to access all of the tools and resources to be productive, regardless of the device that they&#rsquo;re on. For IT, this heterogeneity makes enabling secure access incredibly complex.

That is why Workspace ONE was designed to enable secure access to corporate resources, on any device, without sacrificing security and control. Workspace ONE enables secure management and delivery of business-critical resources (mobile apps, legacy Windows apps, cloud services) to employees for corporate IT, and consumer simple access for end users. And it works for any type of user, on any device, whether it be iOS, Android or Windows 10.

So we are excited to see the Workspace ONE app be recognized by a distinguished panel of independent experts, analysts, journalists and academics. We look forward to sharing more good news on Workspace ONE throughout 2017!

Related:

  • Frost & Sullivan Recognizes VMware & Workspace ONE as Visionary Innovation Leader for End-User Computing
  • New! VMware 2016 State of the Digital Workspace Report
  • 2017: The Year of the Digital Workspace & User Experience Technology

The post VMware Wins for Third Time at Global Mobile Awards appeared first on VMware End-User Computing Blog.

Read more..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 36 bytes)
in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 2023

Query Monitor