SYS-CON MEDIA Authors: Sean Houghton, Glenn Rossman, Ignacio M. Llorente, Xenia von Wedel, Peter Silva

News Feed Item

OneLogin Releases Results of 2013 State of Cloud Application Access Survey

According to the results of a new survey on the adoption, use and security of cloud applications, a large majority of respondents, 78%, plan to increase the number of cloud apps in their organizations this year. At the same time, 71% of respondents admit they are using cloud apps that have not been sanctioned by their IT departments. The data is part of the 2013 State of Cloud Application Access Survey conducted by OneLogin, the innovator in identity management, in collaboration with security consultancy flyingpenguin, of 200 IT and business professionals within organizations of all sizes and industries.

“This survey demonstrated that 2013 will be a tipping point in cloud adoption. With enterprises rapidly turning to cloud apps, the inherent risks in practices like using unsanctioned apps or sharing passwords on sticky notes need to be addressed, and quickly,” said Thomas Pedersen, chief executive officer of OneLogin.

Designed to collect the views of IT and business people regarding the pace of cloud application adoption and usage, the survey revealed that with access to these applications taking place from a variety of locations including smartphones (80%), tablets (71%) and non-company computers (80%) and with a large percentage of organizations (73%) needing to grant temporary access to cloud apps, respondents cited concerns around identity management, governance and complexity.

Among the issues found in the survey:

  • Shadow IT - 71% of respondents admit to using cloud applications that have not yet been sanctioned by their IT department (like Dropbox and Gmail) to get work done.
  • Unsafe password management - 43% of respondents admit that employees manage passwords in spreadsheets or on sticky notes and 34% share passwords with their co-workers for applications like FedEx, Twitter, Staples and LinkedIn. 20% experienced an employee still being able to login after leaving the company.
  • Single sign-on challenges - 48% of respondents are still not able to sign in to cloud applications with a single set of credentials.
  • Need to provision external users - 72% of the respondents have the need to provide external users (i.e. consultants) with temporary access to the company’s cloud applications.
  • Complex directory infrastructures - 59% of respondents had multiple on-premise directories with Active Directory being cited as the most used directory (40%), followed by LDAP (17%) for managing user identities and application access.
  • Different security model for cloud application access - 34% of respondents claimed that their security model for cloud applications was different than for on-premise applications vs. 45% claiming it’s the same.

"It is no secret that cloud apps need solutions added to improve their security; yet to see 20% of app users admit a breach by ex-employees is still a surprisingly high result,” said Davi Ottenheimer, president of flyingpenguin. “The real story behind the 80% already using cloud apps already is that 70% admit apps came without company approval. In 2013, organizations will need solutions flexible enough to support the 60% with more than four apps already in use, and scalable enough to keep up with the 35% who plan to add at least four new apps this year."

200 people completed the web-based survey which was open between December 7th, 2012 and January 7th, 2013. Respondents were primarily in an IT Leadership role (40%), Business/Operations (23%) or members of the IT Staff (21.50%).

For complete survey results, visit here (http://www.onelogin.com/resources/whitepapers/)

OneLogin provides a cloud-based IAM product that offers simple single sign-on (SSO), making it easier for companies to secure and manage access to applications. As part of the OneLogin product, the company also handles IAM challenges like directory integration, provisioning and strong authentication. This approach helps companies overcome some of the time and cost hurdles that have stopped IAM projects in their tracks, or led to significant additional costs being incurred. OneLogin was recently ranked highest in Network World Magazine’s review of eight SSO tools to automate the logins of enterprise applications and improve password complexity.

Relevant Links:

About OneLogin

OneLogin is the innovator in enterprise identity management and provides the industry's most comprehensive solution for managing user identities, both in the cloud and behind the firewall. Unique capabilities like Cloud Search and OneLogin for iPad break down SaaS data silos and increase productivity. OneLogin’s cloud identity platform comes complete with secure single sign-on for web, mobile and iPad, federated search, user provisioning, deep directory integration with real-time user sync, out-of-band multi-factor authentication, VPN integration and compliance reporting. OneLogin’s catalog contains thousands of pre-integrated applications, including Asure Software, Coupa, Box, Clarizen, DocuSign, Egnyte, EchoSign, Google Apps, Innotas, LotusLive, NetSuite, Microsoft Office 365, Oracle CRM On-Demand, Parature, Salesforce.com, SuccessFactors, WebEx, Workday, Yammer, ServiceNow, Zscaler and Zendesk. OneLogin, Inc. is backed by Charles River Ventures. Free Trial Available at: www.onelogin.com | Twitter: @onelogin.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...