• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)
Smart Authentication to Tackle BYOD Issues - Product Image

Smart Authentication to Tackle BYOD Issues

  • ID: 2705624
  • December 2013
  • 150 Pages
  • Smart Insights

BYOD experience relates to employee-owned devices being used for work. Such an employee mindset evolution may trigger changes in the whole corporate IT ecosystem, as the BYOD trend implies corporate data to travel outside a secure local network. This is why corporate IT departments are striving to adopt authentication solutions to be used on employee-owned mobile devices to secure corporate data.

Smart mobile authentication devices ensure that only the right person with right information access privileges gets his hand on the corporate data. Traditional smart solutions used for logical access include smart cards, One-Time-Password (OTP) generators and USB tokens. Today, the authors can state as a fact that software solutions in some way cannibalize smart authentication solutions.

Nonetheless, this report establishes that BYOD software authentication solution shipments that will reach 223 million units by 2018 (CAGR of 27%) will not overthrow more secure and robust smart hardware authenticators. BYOD hardware authentication solution shipments will reach 343 million units by 2018 (CAGR of 46%).

The analysis was conducted based on primary and secondary research, the READ MORE >

Executive Summary

Table of Illustrations

1 Bring Your Own Device trends (BYOD)

1.1 BYOD market overview

1.2 BYOD functional aspects

1.2.1 Benefits of BYOD

1.2.2 Disadvantages of BYOD

1.2.3 BYOD drivers

1.2.4 BYOD savings opportunities

1.3 BYOD trends (surveys)

1.3.1 Infosecurity 2012 BYOD survey

1.3.2 Cisco survey

1.3.2.1 US survey

1.3.2.2 Worldwide survey

1.3.2.3 Regional summary

1.3.3 Good Technology survey

1.3.3.1 BYOD support by industry

1.3.3.2 BYOD support by geography

1.3.4 Symantec survey

1.4 BYOD market quantitative overview

1.4.1 Mobile devices usage in the enterprise

2 BYOD issues & user friendliness

2.1 BYOD issues & challenges

2.1.1 Security and device management

2.1.2 Lifecycle management

2.1.3 Multiple platform support

2.1.4 Privacy issues

2.1.5 Legal issues.

2.1.6 Third-party applications

2.1.7 Data storage issues

2.2 BYOD security risks

2.3 User experience

3 BYOD authentication

3.1 Overview

3.1.1 Authentication security levels

3.1.2 Authentication principles

3.1.2.1 Two-factor authentication

3.1.2.2 Three-factor authentication

3.1.2.3 Single sign-on

3.1.2.4 OATH

3.1.2.5 OAuth and OpenID

3.1.2.6 PKI

3.1.3 Hardware protection.

3.1.4 The chain of trust during ID usage

3.1.4.1 ID device authentication.

3.1.4.2 Reader authentication

3.1.4.3 ID credential authentication

3.1.4.4 ID holder authentication

3.2 BYOD authentication methods and form factors

4 BYOD authentication solutions

4.1 Smart cards

4.1.1 Challenge / response

4.1.2 Use cases.

4.1.3 Enterprise security smart card suppliers

4.1.4 Enterprise security smart card reader suppliers

4.2 USB tokens.

4.2.1 Passive tokens

4.2.2 Active tokens

4.2.3 Enterprise security USB token suppliers

4.3 OTP tokens

4.3.1 Hardware OTP.

4.3.2 Out-of-band authentication.

4.3.3 SMS soft tokens.

4.3.4 One-time-passcode list

4.3.5 Display card with OTP generator

4.3.6 Enterprise security OTP generator suppliers

4.4 Mobile hardware authentication

4.5 Mobile software authentication

4.6 Biometric authentication

4.7 Trusted execution environment

4.8 BYOD authentication adoption

5 Industry players

Glossary

The Moore’s law inspires exponentially decreasing smartphone and tablet prices. Growing affordability of such modules leads to higher smart device penetration globally. Increasing number of mobile device shipments, mainly of smartphones and tablets, spurs “Bring Your Own Device” (BYOD) trend adoption worldwide. Indeed, the BYOD experience that relates to employee-owned devices being used for work continues to spread and it is already out there.

The BYOD market is growing due to a plethora of reasons. Primarily, along with skyrocketing smart device shipments, the BYOD market is a consequence of employees’ attitudes and mindset change. BYOD is no more considered by workers as a privilege but rather a right: a right to use latest technologies available on the market, a right to operate the same applications they are accustomed to, a right to do a job the way they want to do it.

Secondly, tangible BYOD advantages make employers go after this trend and adapt their IT policies. BYOD benefits, including employees availability, connectivity, productivity increase due to the telework, usage of most high-performance tools on the market, ensure both employers’ and employees’ satisfaction.

In fact, in the connected world, the telework can be put apart as a third reason inspiring BYOD adoption. Many researches show how steadily the number of teleworking employees grows. As the matter of fact, the work, in the very sense of the word, is no more limited to a place or premises. No matter how and were employees are doing the job, what is important is the result and, eventually, the profitability of the company they work for.

Naturally, the BYOD has also some issues to be tackled. Along with legal issues and privacy concerns, security is brought up as one of the major problems. IT departments are facing the question of how to secure the corporate data that needs to be accessible remotely or even travels from closed corporate network to employees’ devices.

So far, the authors clearly see the move from corporate network and data centers security, which is generally already in place thanks to the long history of closed local corporate networks, to the security of the other side of communication channels – employees’ devices.

As a result, what the authors believe is the most successful solution to secure the corporate data on the mobile devices side is the combination of Mobile Device Management (MDM) and mobile multi-factor smart authentication.

MDM solution enables the remote management of mobile devices to control the part of a device dedicated to corporate usage, as well as the interaction with third-party applications, and, when needed, remote wiping of the corporate data.

As of smart mobile authentication devices, they ensure that only the right person with right information access privileges gets his hand on the corporate data. Traditional smart solutions used for logical access include smart cards, One-Time-Password (OTP) generators and USB tokens. Today, the authors can state as a fact that software solutions in some way cannibalize smart authentication solutions.

Nonetheless, this report establishes that BYOD software authentication solution shipments that will reach 223 million units by 2018 (CAGR of 27%) will not overthrow more secure and robust smart hardware authenticators. BYOD hardware authentication solution shipments will reach 343 million units by 2018 (CAGR of 46%).

Indeed, companies in industries with severe corporate governance norms are more likely to adopt strong security measures. Simply put, they will rely on robust hardware authentication solutions for logical access. Businesses that are more likely to adopt BYOD hardware authentication solutions are not limited to military services providers, and also include financial, healthcare industries, etc. Furthermore, the larger the corporation is, the more they adopt BYOD hardware authentication solutions.

At the same time, the authors clearly see how new BYOD authentication solutions appear around smart mobile devices. Smart devices represent a huge potential for introduction of new services and applications for end-user. As of the enterprise security, smart devices-centric approach of BYOD corporate data access leads to integration of more secure smart solutions into mobile phones. The main goal of this approach is to have a universal device that will be used for both secure consumer transactions as well as a corporate physical and logical access control.

For this reason, secure microSD solutions offered today on the market show the advantages of embedding a robust authentication module into a smart mobile device. Such a device can be used for both secure online transaction on the mobile device itself, or as a dedicated authentication gadget based on NFC capabilities (card emulation mode).

Likewise, some handset makers go further by integrating biometric authentication sensors into mobile devices to have match-on-devices authentication capabilities. Biometric authentication solutions for mobile devices may be based on fingerprints, retina, voice recognition, etc. Patent applications filed by handset makers show even DNA recognition experience on smart mobile devices.

On the whole, BYOD adoption already takes place globally. The secure transactions industry is ready to provide all necessary means to secure remote authentication on employee-owned mobile devices.

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos