White Papers

Mobile and Web Authentication White Papers

 

Securing "Bring Your Own Device" (BYOD)

Traditional authentication methods are fraught with difficulties and security risks. The rise of personal smartphones and tablets in the workplace is compounding the problems because the IT departments have less control over the devices that are connecting to enterprise systems and data, or the authentication methods used to access them. This executive brief from Osterman Research discusses the challenges and describes how businesses can securely enable "Bring Your Own Device" (BYOD).

Read the Osterman Research Executive Brief

 

Mobile Security Survey

Mobile Security Survey Results 

A survey conducted by Confident Technologies revealed that most smartphone and tablet owners do not password protect their devices, even though they have them connected to sensitive applications like banking and shopping apps, and work email accounts. These poor security habits are born out of frustration -- people have a hard time typing complex passwords on smartphone keyboards. Read the full survey results to learn about the realities of people's mobile security habits and what can be done to make authentication easier on mobile websites and mobile apps.

Read the survey results and analysis

 

two-factor authentication white paper

Two-Factor Authentication White Paper

Cybercriminals are increasingly targeting mobile phones and the SMS communication channel used by many businesses for two-factor authentication. Using a variant of the Zeus malware, they can intercept the authentication text messages businesses send  customers and use them to authenticate their own fraudulent transactions. As attacks continue to increase, businesses need a more secure approach to two-factor authentication on mobile phones. This white paper discusses how image-based authentication creates a multi-layered authentication challenge on the second factor device to verify that it is actually the legitimate user in possession of the device and not someone else who has stolen the phone or is intercepting the communication using malware.

Read the white paper

 

When Passwords Aren't Enough Authentication White paper

One-Time Passwords Using Images

Authentication on websites and cloud-based services has traditionally involved a trade-off between security and usability. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. It will describe how businesses can increase security, reduce support costs and improve the customer experience by deploying a flexible layer of authentication that is easy and intuitive for users, yet highly secure.

Read the white paper

 

Balancing Strong Security and Usability Whitepaper

Strong Authentication White Paper

When implementing strong authentication on a website, IT professionals must find a balance among three separate forces whose goals are often at odds: the cost and security needs of the company, the impact on user behavior, and the motivations of the would-be attacker. This paper gives practical strategies achieving the optimal balance of security, usability and costs and it evaluates the pros and cons of various authentication approaches so IT professionals can choose what is right for their business.

Read the white paper

glqxz9283 sfy39587stf02 mnesdcuix8