Duo Security, Ackcent’s strategic partner in Spain, who offers as part of its security portfolio a multifactor authentication (MFA) solution that is a leader in push technology, has released The 2018 Duo Trusted Access Report: The State of Enterprise Remote Access
Duo Security, Ackcent’s strategic partner in Spain, who offers as part of its security portfolio a multifactor authentication (MFA) solution that is a leader in push technology, has released The 2018 Duo Trusted Access Report: The State of Enterprise Remote Access, a latest report about user behaviour and device health analysis.
When it comes to remote access, users are increasingly logging into work applications from non-office networks. This is unsurprising, given the global trend toward a more distributed workforce.
Remote work is up – whether it’s working from home or potentially other places, like coffee shops, airports, hotel rooms, etc. And that means your users need to be able to access work resources remotely to do their jobs – luckily, the cloud-centric model of applications means they can log in wherever they have a web browser and Internet.
Given all the risks that phishing and malware present to remote access to applications used in the enterprise, the industry is seeing a shift to identity-based controls that verify both the identity of a user and security health of their device.
The WannaCry ransomware epidemic that hit the globe in May of last year moved like a worm, quickly spreading across computer networks, encrypting files, denying access, demanding ransom for decryption, and generally wreaking havoc on major healthcare systems, gas and electric companies, telecom businesses and many others.
The report concludes that about 11 million users completed nearly half a billion authentications per month, using 10,7 million devices to securely log into 800.000 enterprise applications and services.
Download here the full report, where you can find an analysis of enterprise user behaviour and device health, as well as results from thousands of simulated phishing campaigns.