Keep safe with a context-aware security approach  

Findings show many of today’s traditional security policies result in too many passwords, access protocols and employee workarounds that expose the business to risk.

  • 8 years ago Posted in

Dell has revealed the results of a global security survey uncovering how common access management processes limit employee productivity and often force employees to find workarounds that expose organisations to greater risk. In fact, 91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place. However, if a business were to implement a context-aware security approach, replacing traditional, static access processes, 97 percent of IT professionals say they would see the benefits, including improved worker productivity without compromised security.


Context-aware security replaces static access processes with an approach that evaluates the context surrounding each access request, and adapts security requirements accordingly, delivering the level of security the business needs in real time based on an ever-changing threat landscape. While nearly 100 percent of IT professionals surveyed recognise the benefits a context-aware security approach would bring, only 28 percent said their organisations have fully embraced this approach. More than 60 percent indicated that lack of awareness about context-aware security is the greatest barrier to adopting it in their organisation.


Additional notable survey findings:
• More than 90 percent of business respondents use multiple passwords on a daily basis
• 92 percent of business respondents are negatively impacted when required to use additional security for remote work
• When looking at changes made to corporate security policies in the past 18 months, more than half of business respondents say security’s negative impact on day-to-day work has increased
• Nearly 70 percent of IT professionals say employee workarounds to avoid IT-imposed security measures pose the greatest risk to the organisation
• 97 percent of IT professionals see the benefits in context-aware security, including:
o The ability to prioritise threats based on context, including types of applications targeted
o The ability to gain visibility into the context when assessing risk
o The ability to address changing security needs in real-time and assess threats based on potential level of harm
o The ability to improve worker productivity without sacrificing security
• 93 percent of IT professionals said that a lack of context-aware security causes challenges that include:
o Difficulty in quickly addressing changing security needs
o Non-standard access needs that require IT intervention
o Unnecessary impact on employee productivity
o Inability to analyse how/why restrictions are managed to improve worker productivity
Organisations can successfully balance the right level of security and employee productivity with a context-aware security approach


Traditional security approaches address point-in-time risk with security implemented in silos. Separate passwords for everything – layered with multifactor authentication – plus separate security measures for remote workers, BYOD, and protection against outside threats result in poorly implemented security that obstructs productivity and exposes the business to risk from employee workarounds. Security doesn’t have to trump employee productivity. A context-aware approach alleviates mismanagement of access issues by focusing on the context of the access request to ensure access is appropriate in real-time. IT gains the ability to automate and “step-up” to multifactor authentication when the context dictates for an informed, priority-based decision specific to the situation. In addition, multiple passwords (or authentication actions) can be unified to present the user with a seamless access experience that maintains all the security that business and IT demand without negatively impacting employee productivity. Implementing a context-aware security approach helps businesses change security from a productivity barrier to a business enabler.

AWS’s investment reflects long-term commitment to meeting Europe's digital sovereignty...
Google Cloud enables CrowdStrike for Mandiant IR and MDR services.
Collaboration with Dell Technologies provides customers with increased efficiency, security and...
Arqit Quantum and SoftIron have formed a partnership to enable customers to make a seamless...
The Infrastructure as a Service (IaaS) solution provides fast, flexible and secure cloud...
Collaborates with AMD, to radically transform the market for accelerated computing.
With advanced computational methods, the companies scanned billions of detections, discovering...
HashiCorp Cloud Platform (HCP) enables enterprise customers to do cloud right to increase speed,...