Authentication options to meet varying industry and security level challenges

Authentication options to meet varying industry and security level challenges

KeyIdentity addresses multiple considerations when reviewing authentication technologies:

  • Security: via an open source core that addresses cryptographic back door concerns
  • Flexibility: extensive support of various tokens from different manufacturers
  • Speed of implementation: modules integrate with existing authentication services
  • Ease-of-operation: on premise rollouts can be as quick as typical cloud solutions

A global customer base across a wide range of verticals such as retail, telco, banking, government and insurance utilise KeyIdentity's solutions to match security requirements that span use cases such as high volume consumer logins, banking transactions and public sector employee data protection for example.

Weak Passwords

The average user has to remember passwords for 26 different systems, so they choose default ones such as "123456789", and reuse this for on average 5 different application logins. This makes them easy to crack and the used for access to multiple other accounts. LinOTP's 2FA solution reduces the risks of a data breach even if a hacker can crack a weak password.

Fraud

Victims are unknowingly transferring money to fake accounts posing as legitimate online shopping sites, established suppliers and trusted personal bank accounts. KeyIdentity enable you to implement additional authentication requirements for high value transactions, reducing the potential for fraudsters to transfer funds from a potential victim's account.

User Adoption

Overly complex, unreliable (false positives/false negatives) and unintuitive additional verification results in poor adoption and negative customer and employee feedback. LinOTP has a range of lightweight and easy to use solutions to drive rapid adoption. These include hardware and digital tokens, offline authentication and QR codes.

Vendor Lock-In

Certain authentication solutions require changes to the existing IT landscape and are expensive and time-consuming to migrate off at a later date. LinOTP has a vendor neutral API-first architecture that speeds integrations, whilst supporting a range of established standards.

Knowledge Gap

Some solutions require in-depth expertise and extensive consulting as they impact multiple aspects of security infrastructure. KeyIdentity authentication modules integrate with existing authentication services to add MFA capabilties, reducing the need for deep product training and speeding implementation time.

Compliance

Data breaches caused by hackers are increasing across small, large and medium sized organisations. Safeguarding identity theft is essential for legal and reputational reasons. Using 2FA from LinOTP reduces the impact of a data breach as it requires a unique identifier before granting access to a system or accounts. Should a data breach occur, additional authentication for login can be imposed.

 

 

Account Sharing

Sharing account details means the actual user logging may not be authorised to do so, and increases the chances of access by criminals. By requiring an additional authentication method (such as a token), LinOTP requires the person logging into an account to be verified. This prevents unauthorised access and encourages no further sharing of passwords, as these are no longer sufficient to gain access.

Support Costs

User logins have multiple issues such as false negatives, requests for tokens upon logins on the same machine and day, and difficulties in resetting credentials.  These impact user interest in using the additional security measures. With an easy-to-use automated installation, LinOTP is a modular solution that can be trialled at the workgroup level and rolled out incrementally, adapting as future needs evolve.

 

Phishing

Attackers are attempting to access login credentials or account information by pretending to be a legitimate entity. If passwords are given to an attacker, 2FA means additional credentials are required before access is granted. The attacker's attempts can be logged and the user notified to update their existing password.

"2FA: Safeguard the digital enterprise's brand and reputation"