IT Decision Makers Hold the Key to Breaking Down the Barriers to Security

2279 1

European IT decision makers cite budget, time and compliance as the biggest barriers to adopting new security technology, but over half of them said they were responsible for
overcoming these obstacles

 Identity security company, Ping Identity, has announced research highlighting that 52% ofEuropean IT decision makers believe it’s their sole responsibility to overcome the multiple barriers that exist to adopting new security technology within their organisations.

Nearly 60% of IT decision makers across Europe cited budget as one of the biggest barriers to adopting new technologies, with 23% stating compliance issues and 28% revealing that time was a significant barrier to implementation.

New identity security software, including two-factor authentication and biometric solutions, topped the list of technology that European IT decision makers were keen to implement, with 84% of respondents considering it a top priority for the business as a whole.

Phil Allen, VP EMEA at Ping Identity commented on these findings,

“IT decision makers are stuck between a rock and a hard place, knowing they need to overcome these barriers to ensure their business remains safe, but being faced with an uphill climb that potentially leaves the organisation exposed in the meantime.

 “Undertaking a digital transformation project and implementing new security technologies throughout a business can be a daunting proposition – especially if perceived barriers are firmly in place. However, there are some simple, yet effective, steps that IT decision makers can follow in order to ‘break down’ any barriers to strong identity security:

1)    Arm the CEO and C-suite with information as to why identity security should be a board-level concern. Cyber-attacks and password breaches cannot just cause reputational damages, but can also result in the loss of highly confidential corporate data and cause tangible financial losses. Speaking to the board in these terms will ensure that robust identity security is considered as crucial to the growth of the business.

2)    Provide knowledge that is easily digestible for various stakeholders within the business. Senior business decision makers will need to understand the business case for new identity security technologies. Providing them with something as simple as examples of companies that have implemented new technologies seamlessly and cost-effectively can significantly help to change mindsets.

3)    Integrate new software with existing legacy systems. Replacing legacy IT infrastructure can be costly and timely. However, legacy systems can be brought up to date with the integration of cloud-based technologies.

4)    Ask your staff what identity technologies they want to see rolled out across the business. People are arguably a business’ most valuable asset, so it is imperative to regularly ask the organisation what more they need in the way of new software and new technology. For example, many employees may want more secure and seamless access to their work devices and programmes, so that they can work on the move and in the most productive manner possible. In this regard, investing in two-factor authentication could be a solution to ensuring staff are happy, productive and secured.”

About Ping Identity
Ping IdentityPing Identity is the leader in Identity Defined Security for the borderless enterprise, allowing employees, customers and partners access to the applications they need. Protecting over one billion identities worldwide, the company ensures the right people access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, Cisco, Disney, GE, Kraft Foods, TIAA-CREF and Walgreens, trust Ping Identity to solve modern enterprise security challenges created by their use of cloud, mobile, APIs and IoT.

In this article