Skip navigation
Skip navigation

whilst organisations are confident that they can assure appropriate user access to resources on-site, they become less so when users connect via the cloud or a mobile device

69 Per Cent of Organisations Say Employees are Connecting Personal Mobile Devices to the Corporate Network; More Than One in Five Organisations Does Not Have a Policy in Place to Govern This Use

WESTBOROUGH— July 26, 2011 — Courion® Corporation, the leading provider of Access Risk Management solutions that help organisations cost-effectively deal with identity and access compliance and security risk, fielded a global survey to assess organisations’ confidence levels in controlling user access to corporate data via mobile devices and cloud services.

The results of the survey of 988 IT decision makers at large organisations indicate that whilst organisations are confident that they can assure appropriate user access to resources on-site, they become less so when users connect via the cloud or a mobile device.

The problem is exacerbated as the volume of mobile device use increases. Two out of every three large organisations report that they now have employees connecting their own personal mobile devices to the corporate network, and yet more than one out of every five organisations do not have a policy in place to govern this use, or is not aware if such a policy exists. This has led to a situation in which nearly one in 10 organisations has faced a data breach following the loss of a mobile device that has accessed their network.

Key data derived from the survey:
• On a scale of 0-5, with 5 being very confident, 57 per cent of respondents marked either a 4 or a 5 to indicate their level of confidence that they could control access to resources on their corporate network. That number dropped to 34 per cent when asked about cloud access, and 40 per cent when handling employee access via mobile devices and laptops.
• 88 respondents (nearly one in ten) admitted to having experienced a data breach as a result of a lost mobile device.
• 69 per cent of organisations say their employees are using personally-owned mobile devices to connect to the corporate network.
• Nearly one quarter of enterprises (21 per cent) either do not have a policy in place to govern the use of personal mobile devices on their network, or don’t know if one exists.

“Mobile devices, whether iOS phones or tablets, or an Android smart phone, are now accepted as necessary tools for productivity in the enterprise, regardless of how they affect data security. That is the new reality,” said Dave Fowler, senior vice president of product and marketing for Courion. “Companies are scrambling to keep up with the information access vulnerabilities and compliance violations created by mobile devices that access and store confidential information. The right Access Assurance solution can bring the same strength of protection to mobile devices that companies have deployed internally.”

Courion recommends that organisations implement and carefully manage a comprehensive Access Assurance strategy in order to define, assess, enforce and verify that the right users have the right access to the right resources and are doing the right things. Ensuring that employee and contractor identities are matched with the access rights they are given – regardless of device or location – is critical to securing corporate data.

To hear more about the survey results and how Courion is working with customers to address the issue of identifying and managing access risk from mobile devices and cloud deployments, please contact:

Martin Brindley
Davies Murphy Group
courion@daviesmurphy.com
01256 807360

About Courion
Courion’s award-winning Access Assurance Suite solutions are used by nearly 500 organisations and over 14 million users worldwide to quickly and easily solve their most complex identity and access management (password management, provisioning, and role management), risk and compliance challenges. Courion’s business-driven approach results in unparalleled customer success by ensuring users’ access rights and activities are compliant with policy while supporting both security and business objectives. For more information, please visit our website at www.courion.com, our blog at blog.courion.com, or on Twitter at twitter.com/Courion.

To view this release online, go to: www.courion.com/company/press_release.html?id=943


# # #

Courion is a registered trademark. All other company and product names may be trademarks of their respective owners

This press release was distributed by ResponseSource Press Release Wire on behalf of Courion in the following categories: Consumer Technology, Business & Finance, Computing & Telecoms, for more information visit https://pressreleasewire.responsesource.com/about.