Welcome!

@CloudExpo Authors: Liz McMillan, Mehdi Daoudi, Elizabeth White, Pat Romanski, Yeshim Deniz

Blog Feed Post

Study: Companies can halve authentication costs by ditching hardware tokens

Large enterprises can save more than $165,000 by shifting to smart device-based software for vital authentication in BYOD era

Click on the following link for an image: http://goo.gl/7Lzu0

Oslo, Norway, 4th July, 2012 - A new study, carried out by authentication experts Encap, compares the cost of authentication methods for enterprises. It reveals that large companies could halve the total cost of ownership of authentication technology used by employees for secure access to enterprise services/applications via private and enterprise owned networks. An enterprise with around 3,000 employees could save up to $165,000 over three years by migrating from hardware-based solutions.

Top line findings:

  • CAPEX: The deployment cost for hardware one time password (OTP) is $202,000 vs. smart device-based software at $9,000, representing a 95 per cent decrease in cost

  • Replacement costs: Hardware OTP replacement costs are over 90 per cent more expensive than all software based approaches

  • Annual cost per user: SMS OTP is the highest annual cost per user at $35, when compared to $15 for smart device-based software

  • Software-based: Smart device-based software is at least 60 per cent less expensive than all other software based approaches in terms of annual costs per user

Today, authentication methods are predominantly hardware-based and usually take the form of a small device or token that provides a one-time-password (OTP) that an employee uses to access enterprise or cloud services. The need for employee authentication is increasing in importance with the emergence of the 'bring your own device' (BYOD) phenomenon.

"The BYOD trend is growing, and employees are demanding access to enterprise applications quickly and securely, no matter where they are or what device they are using. A solution that allows access to these services regardless of the device, location or network in a secure manner is invaluable to enterprise IT managers," says Sarah Wallace, Analyst for Heavy Reading.

Encap's study analysed the average cost of the six most prevalent approaches to authentication for a large enterprise with 3,000 users over a three year period. These include hardware approaches such as hardware OTPs and smart tokens (a USB or smart card), as well as software such as smart device-based software, mobile OTP (usually an app), PC OTP (via a web-browser) and SMS OTP. All of the approaches are two-factor authentication where the user requires something they have (a card or token) and something they know (password or PIN) to gain access.

Encap Enterprise Authentication Study - Top Line Results
Costs (all USD)Smart Device SoftwareHardware OTPSmart token (Smart card/USB)Mobile OTP soft tokenPC OTP soft tokenSMS OTP
Total deployment cost 9,000 202,000 181,000 127,000 127,000 82,000
Total cost of ownership 135,900 301,075 277,975 217,075 217,075 316,075
Annual total cost per user 15.10 33.45 0.89 24.12 24.12 35.12

"Having invested in remote access and cloud apps, enterprises must do everything possible to simplify speedy and secure access. Smart device software authentication turns smart devices - enterprise or employee-owned - into security credentials at an unbeatable price point," said Thomas Bostrøm Jørgensen, CEO of Encap. "Our study shows that the time for hardware-based authentication has passed - it is just too expensive when compared with the alternatives."

"But this is about more than just cost," continued Jørgensen. "Employees - people - want simple access across a range of devices. Similarly, IT managers want to easily integrate authentication without painful provisioning and replacement issues. Hardware approaches are incompatible with today's world of smart devices, remote access and cloud apps. It's time for a change.

- Ends -

Note to editor:
Encap's analysis is based on key variables in line with industry norms and values. The data is based on variety of sources including the 2011 Gartner report "How much is that token in the window? What you should expect to pay for new authentication", RSA and VeriSign data, as well as Encap's own data.

The study:
For more information about the study please contact Encap on: [email protected]

About Encap
Encap provides simple software-based, two-factor authentication and digital signing for the enterprise and banking sectors.

Encap represents a revolutionary new approach to authentication for the post-PC era. It replaces hardware and one time password authentication solutions such as tokens, card readers, SIMs and SMS with a mobile client linked to a smart device. Easy, quick and convenient for users, Encap creates a familiar, intuitive authentication process that works across all platforms - PC, mobile or tablet - and via the cloud.

Encap's unique patented software delivers a ubiquitous security solution that is scalable, easy to integrate and requires no capital investment.

Based in Oslo, Norway, Encap's world class management team has an unrivalled pedigree in mobile banking, finance, enterprise and remote access security. The Encap solution is approved by the Norwegian Banks' Standardisation Office and used by major banking institutions, enterprises and technology integrators.

www.encapsecurity.com

Contact for Press:
Daniel Lowther
CCgroup
T: +44 7747 636 687
E: [email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

CloudEXPO Stories
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundation of software-defined infrastructure, Nutanix has rapidly expanded into full application lifecycle management across any infrastructure or cloud .Join us as we delve into how the Nutanix Developer Stack makes it easy to build hybrid cloud applications by weaving DBaaS, micro segmentation, event driven lifecycle operations, and both financial and cloud governance together into a single unified st...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Sold by Nutanix, Nutanix Mine with Veeam can be deployed in minutes and simplifies the full lifecycle of data backup operations, including on-going management, scaling and troubleshooting. The offering combines highly-efficient storage working in concert with Veeam Backup and Replication, helping customers achieve comprehensive data protection for all their workloads — virtual, physical and private cloud —to meet increasing business demands for uptime and productivity.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of Strategic Alliances at Kentik, discussed tactics and tools to bridge the gap between IoT project teams and the network planning and operations functions that play a significant role in project success.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lavi, a Nutanix DevOps Solution Architect, explored the ways that Nutanix technologies empower teams to react faster than ever before and connect teams in ways that were either too complex or simply impossible with traditional infrastructures.