Securing Network Infrastructure with User Convenience
So many network breaches to read about, so little time. The scary thing is that these headline grabbers are generally global, well-known companies that you would expect to have a secure network infrastructure. As an IT professional or director, you would hope that since this type of company is a larger target, they would have a correspondingly large budget and IT department to address these concerns.
Regardless of how big the company, there will always be a limit on employees, time, and resources. Given all the negative publicity and pain associated with corporate network breaches, CIOs are putting a renewed focus and increasing the number of projects related to establishing a secure network infrastructure this year. 2015 is primed to be the year where those languishing security projects finally get revitalized. Two factor authentication could become more mainstream as part of employees’ day-to-day use, but the disruption associated with two factor authentication is well known and a common barrier to adoption.
Focusing on projects that have the largest impact with minimal implementation time is a sound approach. SearchCIO has a relevant article on Project Prioritization and Portfolio Management. You may also consider PortalGuard’s PassiveKey which is an innovative two factor authentication offering that focuses on simplifying the user experience without compromising security. Two factor VPN access for end-users is as simple as enrolling their workstation a single time, then pressing a Hotkey combination when prompted for an OTP from the VPN.
Two factor authentication to both corporate-controlled and cloud-hosted web applications is achievable through PassiveKey’s browser app that automatically and transparently sends short-lived, Time-based OTPs when authenticating against your PortalGuard server. Legitimate users only need to manually enter their username and password a single time during their browser session. Industry-standard protocols such as SAML, WS-Federation, CAS, and OAuth are used to federate with the target web applications and funnel logins through a central login that enforces a consistently strong level of authentication. That’s an ideal everyone can make a little time for.