Identities look to be next major security control
August 7, 2014

The security landscape continues to shift rapidly amid the evolving demands and threats that are circulating through virtually every industry and region of the world. Whereas protection against digital risks was once wholly found in simple data security software, firewalls and password or credential systems, developers in the security community have started to take far more novel and robust approaches to creating more effective solutions. 

One of the most effective methods of controlling identity and access management is the use of dynamic authentication tools, which have likewise begun to diversify in the past few years. Now, studies are indicating the passwords of old are finally beginning to take their last bow, and that more organizations are looking toward advanced security capabilities to ensure the integrity of their systems and data. 

The results are in
Network World recently reported that a new Ponemon Institute study revealed that bring your own identity has been viewed relatively favorably among IT professionals, but that business owners are not entirely sold on this new approach to access management. According to the news provider, Ponemon found that more than two-thirds of the respondents who hailed from IT backgrounds believed BYOID could potentially improve the security performances at their firms. 

"Organizations that accept third-party identities also worry about instances where an identity is compromised and non-legitimate access is granted to applications or customer data," the source cited from the Ponemon report. 

Network World went on to point out some of the more specific sentiments among IT professionals with respect to BYOID acceptance, with one portion of the survey revealed that roughly two-thirds of the group would prefer if these systems came along with a form of dynamic authentication. 

"This exercise could include basic simulation/modeling of a new online initiative with BYOID and without BYOID," Ponemon's researchers affirmed, according to the source. "This will help address key questions: Will supporting BYOID increase new customer acquisition?"

The rising tide
The last portion of that report highlighted one of the most important factors in the modern security market, in that businesses will rarely invest in a technology that does not directly impact customer retention or revenue levels. Luckily, as more consumers and corporate purchasers begin to demand the most secure and reliable services, dynamic authentication tools will likely become far more popular, including those that are contained within a BYOID policy.