Navigation Links
Unisys Security Experts Predict 2014 Will Be "The Year of Encryption" as Organizations Combat Growing Cyber Threats
Date:12/19/2013

BLUE BELL, Pa., Dec. 19, 2013 /PRNewswire/ -- Security experts at Unisys Corporation (NYSE: UIS) today predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders.

Disclosures that the U.S. government may have accessed data from the internal networks of major internet service providers have already prompted some of these companies to expand the use of encryption within their own organizations, Unisys experts noted. That activity will continue to grow in 2014, resulting in an explosion in the use of encryption tools, they said.

"Regardless of what you might think of Edward Snowden, the government contractor who leaked secrets about U.S. government surveillance, there is no denying that his disclosures have heightened awareness of cybersecurity all over the world," said Dave Frymier, Unisys chief information security officer. "Before that, many enterprises were running unencrypted data on their internal networks, which they believed were secure. Now they are beginning to use encryption internally as well, so we expect 2014 to be the year of encryption."

As a result of the Snowden disclosures, officials at the highest levels of organizations around the world will increase their focus on data loss prevention, encryption and prioritizing investments in security, Unisys experts predicted.

Frymier added that the increased use of encryption will both enable and encourage more companies to use infrastructure-as-a-service (IaaS) cloud solutions, where previously they might have had concerns about the safety of their data in the cloud.

New iPhone fingerprint readers jumpstart consumer acceptance of biometrics

Unisys experts also predicted that consumers will embrace the accuracy and ease-of-use of fingerprint readers on the new Apple iPhone, leading to a broader acceptance of biometrics in general. This could jump start a rapid growth in the use of biometrics – including fingerprint, iris scanning and facial recognition – on consumer devices as a way to protect the devices and data, as well as a method to confirm the identities of users for activities such as online retail transactions.

The acceptance of biometrics will begin the evolution away from the traditional user ID/password combination used most frequently to verify online identities.

In addition, the ability to automatically pinpoint a user's specific device as well as its geographical location will give security managers insight into the "context" of that user's attempt to access the network. Contextual authentication solutions can alert managers when, for example, someone outside of a pre-determined geographical area attempts to access their networks.

In the same way, attribute-based access controls identify access requests that fall outside a user's normal pattern, such as attempts to obtain information they don't normally access or at unusual hours. By combining these insights with other identity management methods like biometrics, security professionals can make it much more difficult for those without permission to gain access to networks and applications.

Focus on securing mobile devices and apps

Unisys experts predicted a rise in security awareness and protection techniques related to enterprise BYOD (bring your own device) programs. For example, Steve Vinsik, Unisys' vice president for global security solutions, predicted a rise in "bring your own security" scenarios, in which employees using their own mobile devices for work also employ their own security measures – often without the consent or awareness of enterprise security managers.

"That opens up a whole host of issues around how enterprises deal with people having their own security on their devices, and how that interacts with the enterprise's ability to monitor and manage that device," Vinsik said.

Frymier said software sandbox models, in which enterprises deploy mobile apps in an environment that is totally isolated from other applications, will continue to gain acceptance. By employing this model, organizations can stop, start, install and uninstall corporate mobile apps without affecting other parts of the mobile device.

Among financial institutions, advances such as embedded biometrics in mobile devices will give rise to greater acceptance of consumer banking transactions and e-commerce on mobile devices. Likewise, 2014 will see banks further exploring the use of self-service outlets and kiosks that require a combination of physical and digital security methods, including biometrics.

About Unisys

Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 22,500 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit www.unisys.com.

Follow Unisys on Twitter.

RELEASE NO.: 1219/9215

Unisys is a registered trademark of Unisys Corporation. Any other brand or product referenced herein is acknowledged to be a trademark or registered trademark of its respective holder.


'/>"/>
SOURCE Unisys Corporation
Copyright©2012 PR Newswire.
All rights reserved

Related biology news :

1. Improved Authentication and Confidentiality Protection. ICAP Patent Brokerage Announces for Auction Important Patents in Data Encryption and Document Security
2. Beating famine: Sustainable food security through land regeneration in a changing climate
3. Heightened Security Threats and Economic Issues Provide Fillip to Global Civil and Military Biometrics Market, Says Frost & Sullivan
4. Jim Demitrieus, CEO of EyeLock, Invited to White House Cyber Security Event
5. Researchers advance biometric security
6. Security Technology Executive, SIA and ISC East announce Security Innovation Awards Collaboration
7. MSU to lead new global food security effort
8. Farmer-led irrigation schemes could alter food security in sub-Saharan Africa, South Asia
9. Securiport: Biometric Scanning is Gold Standard in Airport Security
10. IdentiSys acquires the Identification, Security and Presentation Divisions of Mountainland Business Systems, a Utah based reseller
11. Wild bees: Champions for food security and protecting our biodiversity
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:4/28/2016)... BANGALORE, India , April 28, 2016 ... subsidiary of Infosys (NYSE: INFY ), and Samsung ... global partnership that will provide end customers with a ... and payment services.      (Logo: http://photos.prnewswire.com/prnh/20130122/589162 ... for financial services, but it also plays a fundamental part ...
(Date:4/19/2016)... DUBAI , UAE, April 20, 2016 ... can be implemented as a compact web-based "all-in-one" system ... in the biometric fingerprint reader or the door interface ... requirements of modern access control systems. The minimal dimensions ... the ID readers into the building installations offer considerable ...
(Date:4/13/2016)... , April 13, 2016  IMPOWER physicians supporting ... are setting a new clinical standard in telehealth thanks ... By leveraging the higi platform, IMPOWER patients can routinely ... pulse and body mass index, and, when they opt ... and convenient visit to a local retail location at ...
Breaking Biology News(10 mins):
(Date:6/24/2016)... 24, 2016  Regular discussions on a range of subjects ... the two entities said Poloz. Speaking at a ... , he pointed to the country,s inflation target, which ... "In certain areas ... have common economic goals, why not sit down and address ...
(Date:6/23/2016)... ... June 23, 2016 , ... Mosio, a ... eBook, “Clinical Trials Patient Recruitment and Retention Tips.” Partnering with experienced clinical research ... by providing practical tips, tools, and strategies for clinical researchers. , “The landscape ...
(Date:6/23/2016)... -- A person commits a crime, and the detective uses ... criminal down. An outbreak of foodborne illness makes ... uses DNA evidence to track down the bacteria that caused ... not. The FDA has increasingly used a complex, cutting-edge technology ... Put as simply as possible, whole genome sequencing is a ...
(Date:6/23/2016)... YORK , June, 23, 2016  The Biodesign ... to envision new ways to harness living systems and ... Modern Art (MoMA) in New York City ... than 130 participating students, showcased projects at MoMA,s Celeste ... Paola Antonelli , MoMA,s senior curator of architecture ...
Breaking Biology Technology: