SlideShare a Scribd company logo
1 of 21
2022 State of Workforce
Strong Authentication
Demographics (n= 310, # employees >1K)
Demographics (n= 310, # employees >1K)
MFA is a work-in-progress for large enterprises.
Only 16% use MFA universally across all use cases.
The ability to use MFA
universally is important
given hackers will find a
way to get to the weakest
link.
Like our research in 2021,
enterprises are still using
MFA sporadically.
One of the promises of
passwordless is to be a
next generation investment
that provides a universal
user experience for
authentication across all
use cases.
MFA use in 2021 vs 2022
Cloud apps still lead the way, with plenty of room for MFA to be used in
desktops/endpoints
Cloud services led the penetration of MFA in ‘21 and
legacy software was among the least penetrated.
2021
Most orgs have multiple MFA solutions
67% have 2 or more.
Along with different MFA
end user experiences,
having multiple MFA
solutions burdens IAM and
IT security teams.
Yet most organizations
have multiple MFA
solutions to meet their
needs, highlighting the
challenge MFA has had in
having universal end-to-
end coverage.
33%
32%
18%
8% 9%
0%
5%
10%
15%
20%
25%
30%
35%
Just one 2 3 4 or 5 More than 5
How many different solution providers does your organization use for
Most orgs buy MFA solutions in addition to their
SSO provider’s MFA offering.
69% of orgs have an MFA solution outside of their SSO providers.
The data here is mixed,
because 69% of orgs use an
MFA from their SSO
provider –with 31% buying
exclusively from the SSO
provider.
But 69% also use at least
one other MFA provider
outside of their SSO
provider, with 31% not
using an MFA from their
SSO provider altogether.
Adaptive MFA is not mainstream yet in large
enterprises.
Despite all the talk about adaptive
risk decision making with Zero Trust,
most organizations have not deployed
adaptive MFA today.
Many organizations look to adaptive
MFA to improve the user experience
and frustration end users feel when
using MFA (aka ”MFA fatigue”).
How are end users feeling about MFA
these days?
End user good will is not high for MFA
55% are ”resigned” when it comes to MFA
The friction that MFA adds to the
authentication event continues to irk
and frustrate end users. Only 31% of
our IT respondents felt that their end
users would consider themselves
happy with their MFA attitudes.
It is clear there is much room for
improvement in delighting end users
and IT groups that sponsor the roll
out of these technologies to their
organizations.
Addressing Passwordless
Confusion in the Market
The goal: Clearing up the confusion
We have found that use of passwordless authentication solutions scores very high for surveys measuring the use of
this technology internally, for employees/workers. We wanted to dig into these prior results (from both our and
other vendor surveys) and understand what IT employees actually consider to be ”passwordless”.
At SDO, we make a distinction between technologies that offer a “passwordless experience” versus those that are
Full Passwordless. Those that have offer a passwordless experience do not meet the requirement of an end user
never having to type in or remember a password, because while most of the time the end user does not need to
enter a password, the password still remains under the covers and must be remembered at some point in the
interaction with the application or resource.
On the other hand, Full Passwordless eliminates the need for an end user to ever need to remember a password.
Whilst our competitors would say because SDO rotates a password we are not true passwordless, we do achieve
this Holy Grail of passwordless of an end user never needing to set or remember a password. In fact, we believe
that our Automated Password Rotation approach uniquely enables us to achieve this for the broadest number of
use cases encountered in a complex enterprise.
Passwordless can mean multiple things
IT security and IAM specialists think of
several things as ”passwordless”
strategies:
- SSO portals that remove the need
to authenticate separately to diff
apps
- Windows Hello for Business and
Mac TouchID which are endpoint
device-bound
- Solutions like SDO and others that
are modern mobile MFA, FIDO2
certified solutions
- FIDO2 keys such as Yubico and
Feitian keys
Defining “Next-Generation Passwordless”
An accurate view of adoption of next
generation enterprise passwordless solutions
By making the distinction of modern,
next gen passwordless solutions from
prior solutions that are more
“passwordless experience” or
passwordless like such as WHfB and
SSO portals, we are able to get a
clearer view of where market
adoption may stand.
A surprising 37% of respondents said
they are currently using a next-gen
passwordless solution based on our
definition.
Another View of It
After explicitly defining “next
generation passwordless” to mean
FIDO2 keys or smartphone-based
biometric solutions for the enterprise,
a full 49% said they are said they have
adopted a next generation
passwordless solution.
While slightly divergent with the prior
slide, it remains in the ballpark for
market adoption of software and
FIDO2 key solutions that can be
considered newer than SSO portals
and endpoint device-bound
biometrics.
"Next generation
passwordless"
49%
Traditional
passwordless only
35%
No passwordless
16%
Type of Passwordless Used
Next Gen Passwordless is the Future of MFA
87% see the transition happening within the next 5 years.
Only 2% do not believe FIDO2 keys
and smartphone-based biometric
passwordless solutions will not
become the leading approach for
workforce authentication in the next
10 years.
In fact, nearly 90% feel it will happen
in the next 5 years and 40% within
the next 2 years.
Why is this?
Better universality and superior UX lead the way
Compliance as a benefit is emerging with the standard 3 motivations for
passwordless.
The standard 3 reasons for
passwordless are:
- Better security
- Better UX
- Lowers costs, ex help desk costs,
etc
We found that better compliance has
emerged with nearly as strong a
showing as those 3 reasons, along
with employee engagement
The view of better security cannot be understated
93% next gen passwordless solutions deliver stronger security outcomes
Despite anecdotally hearing about
market mis-perception that
passwordless is actually less secure
than traditional MFA, our
respondents felt like next generation
passwordless solutions would deliver
stronger security outcomes. Agree
93%
Disagree
7%
"Next generation passwordless has the potential to deliver
stronger security outcomes."
Top Barriers to Next Gen Passwordless Adoption
Confusion, MFA being “good enough” and lack of expertise lead the way
There are a plethora of barriers that
organizations must battle through to
adopt a next gen passwordless
solution, not the least of with is the
perception that traditional MFA is
good enough or that it is not
differentiated from basic 2FA.
Cost, immaturity and inadequate
integration were also cited.
In summary, MFA Key Takeaways
• MFA is widely adopted but insufficient for today’s security needs
● All respondents (100%) have adopted MFA for some type of use
● Only 17% report MFA is used across all workforce passwords
● MFA coverage is more common for cloud (IaaS) and SaaS applications, less for those hosted
on-prem
● MFA coverage is wider for privileged or admin passwords, lower for partner passwords
● 67% work with multiple MFA providers and 69% work with SSO vendors in addition to their
MFA providers
• Only 45% are “very” confident that their workforce MFA strategy is effective
In Summary, Passwordless MFA Key
Takeaways
• ”next generation passwordless” is promising, but challenges remain
● 84% have adopted some kind of passwordless technology
● Only 49% have any kind of “next generation passwordless”
● 93% report “next generation passwordless” has potential to deliver
strong security outcomes
● However, 97% report they face barriers to adoption of “next generation
passwordless”
• 87% believe “next generation passwordless” will be the leading
workforce security approach within five years

More Related Content

Similar to 2022 State of Workforce Strong Authentication

ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
The Spotight is On Passwordless Authentication
The Spotight is On Passwordless AuthenticationThe Spotight is On Passwordless Authentication
The Spotight is On Passwordless AuthenticationAndy32903
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptxFIDO Alliance
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Shawn Nutley
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYForgeRock
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applicationsvlink india
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
4 custom software development trends
4 custom software development trends4 custom software development trends
4 custom software development trendsFingent Corporation
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 

Similar to 2022 State of Workforce Strong Authentication (20)

ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
The Spotight is On Passwordless Authentication
The Spotight is On Passwordless AuthenticationThe Spotight is On Passwordless Authentication
The Spotight is On Passwordless Authentication
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applications
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
4 custom software development trends
4 custom software development trends4 custom software development trends
4 custom software development trends
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 

Recently uploaded

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Recently uploaded (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

2022 State of Workforce Strong Authentication

  • 1. 2022 State of Workforce Strong Authentication
  • 2. Demographics (n= 310, # employees >1K)
  • 3. Demographics (n= 310, # employees >1K)
  • 4. MFA is a work-in-progress for large enterprises. Only 16% use MFA universally across all use cases. The ability to use MFA universally is important given hackers will find a way to get to the weakest link. Like our research in 2021, enterprises are still using MFA sporadically. One of the promises of passwordless is to be a next generation investment that provides a universal user experience for authentication across all use cases.
  • 5. MFA use in 2021 vs 2022 Cloud apps still lead the way, with plenty of room for MFA to be used in desktops/endpoints Cloud services led the penetration of MFA in ‘21 and legacy software was among the least penetrated. 2021
  • 6. Most orgs have multiple MFA solutions 67% have 2 or more. Along with different MFA end user experiences, having multiple MFA solutions burdens IAM and IT security teams. Yet most organizations have multiple MFA solutions to meet their needs, highlighting the challenge MFA has had in having universal end-to- end coverage. 33% 32% 18% 8% 9% 0% 5% 10% 15% 20% 25% 30% 35% Just one 2 3 4 or 5 More than 5 How many different solution providers does your organization use for
  • 7. Most orgs buy MFA solutions in addition to their SSO provider’s MFA offering. 69% of orgs have an MFA solution outside of their SSO providers. The data here is mixed, because 69% of orgs use an MFA from their SSO provider –with 31% buying exclusively from the SSO provider. But 69% also use at least one other MFA provider outside of their SSO provider, with 31% not using an MFA from their SSO provider altogether.
  • 8. Adaptive MFA is not mainstream yet in large enterprises. Despite all the talk about adaptive risk decision making with Zero Trust, most organizations have not deployed adaptive MFA today. Many organizations look to adaptive MFA to improve the user experience and frustration end users feel when using MFA (aka ”MFA fatigue”). How are end users feeling about MFA these days?
  • 9. End user good will is not high for MFA 55% are ”resigned” when it comes to MFA The friction that MFA adds to the authentication event continues to irk and frustrate end users. Only 31% of our IT respondents felt that their end users would consider themselves happy with their MFA attitudes. It is clear there is much room for improvement in delighting end users and IT groups that sponsor the roll out of these technologies to their organizations.
  • 11. The goal: Clearing up the confusion We have found that use of passwordless authentication solutions scores very high for surveys measuring the use of this technology internally, for employees/workers. We wanted to dig into these prior results (from both our and other vendor surveys) and understand what IT employees actually consider to be ”passwordless”. At SDO, we make a distinction between technologies that offer a “passwordless experience” versus those that are Full Passwordless. Those that have offer a passwordless experience do not meet the requirement of an end user never having to type in or remember a password, because while most of the time the end user does not need to enter a password, the password still remains under the covers and must be remembered at some point in the interaction with the application or resource. On the other hand, Full Passwordless eliminates the need for an end user to ever need to remember a password. Whilst our competitors would say because SDO rotates a password we are not true passwordless, we do achieve this Holy Grail of passwordless of an end user never needing to set or remember a password. In fact, we believe that our Automated Password Rotation approach uniquely enables us to achieve this for the broadest number of use cases encountered in a complex enterprise.
  • 12. Passwordless can mean multiple things IT security and IAM specialists think of several things as ”passwordless” strategies: - SSO portals that remove the need to authenticate separately to diff apps - Windows Hello for Business and Mac TouchID which are endpoint device-bound - Solutions like SDO and others that are modern mobile MFA, FIDO2 certified solutions - FIDO2 keys such as Yubico and Feitian keys
  • 14. An accurate view of adoption of next generation enterprise passwordless solutions By making the distinction of modern, next gen passwordless solutions from prior solutions that are more “passwordless experience” or passwordless like such as WHfB and SSO portals, we are able to get a clearer view of where market adoption may stand. A surprising 37% of respondents said they are currently using a next-gen passwordless solution based on our definition.
  • 15. Another View of It After explicitly defining “next generation passwordless” to mean FIDO2 keys or smartphone-based biometric solutions for the enterprise, a full 49% said they are said they have adopted a next generation passwordless solution. While slightly divergent with the prior slide, it remains in the ballpark for market adoption of software and FIDO2 key solutions that can be considered newer than SSO portals and endpoint device-bound biometrics. "Next generation passwordless" 49% Traditional passwordless only 35% No passwordless 16% Type of Passwordless Used
  • 16. Next Gen Passwordless is the Future of MFA 87% see the transition happening within the next 5 years. Only 2% do not believe FIDO2 keys and smartphone-based biometric passwordless solutions will not become the leading approach for workforce authentication in the next 10 years. In fact, nearly 90% feel it will happen in the next 5 years and 40% within the next 2 years. Why is this?
  • 17. Better universality and superior UX lead the way Compliance as a benefit is emerging with the standard 3 motivations for passwordless. The standard 3 reasons for passwordless are: - Better security - Better UX - Lowers costs, ex help desk costs, etc We found that better compliance has emerged with nearly as strong a showing as those 3 reasons, along with employee engagement
  • 18. The view of better security cannot be understated 93% next gen passwordless solutions deliver stronger security outcomes Despite anecdotally hearing about market mis-perception that passwordless is actually less secure than traditional MFA, our respondents felt like next generation passwordless solutions would deliver stronger security outcomes. Agree 93% Disagree 7% "Next generation passwordless has the potential to deliver stronger security outcomes."
  • 19. Top Barriers to Next Gen Passwordless Adoption Confusion, MFA being “good enough” and lack of expertise lead the way There are a plethora of barriers that organizations must battle through to adopt a next gen passwordless solution, not the least of with is the perception that traditional MFA is good enough or that it is not differentiated from basic 2FA. Cost, immaturity and inadequate integration were also cited.
  • 20. In summary, MFA Key Takeaways • MFA is widely adopted but insufficient for today’s security needs ● All respondents (100%) have adopted MFA for some type of use ● Only 17% report MFA is used across all workforce passwords ● MFA coverage is more common for cloud (IaaS) and SaaS applications, less for those hosted on-prem ● MFA coverage is wider for privileged or admin passwords, lower for partner passwords ● 67% work with multiple MFA providers and 69% work with SSO vendors in addition to their MFA providers • Only 45% are “very” confident that their workforce MFA strategy is effective
  • 21. In Summary, Passwordless MFA Key Takeaways • ”next generation passwordless” is promising, but challenges remain ● 84% have adopted some kind of passwordless technology ● Only 49% have any kind of “next generation passwordless” ● 93% report “next generation passwordless” has potential to deliver strong security outcomes ● However, 97% report they face barriers to adoption of “next generation passwordless” • 87% believe “next generation passwordless” will be the leading workforce security approach within five years