Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 20 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

2014 prediction – Cloud will enable authentication

by The Gurus
January 6, 2014
in Editor's News
Share on FacebookShare on Twitter

Authentication will move to be more of a cloud-based solution, and specifically offered in a service-based model.
 
Speaking to IT Security Guru, Jason Hart, vice president of cloud solutions at SafeNet, said that the adoption of cloud is happening as users want to use context-based authentication. “There are different authentication mechanisms, it is about being able to mix and match,” he said.
 
“The software is there, and I think we will see an integration of software tokens that can be used with any application. The client is using the application; they synchronise with the cloud and request a two-factor authentication to generate a one-time password. They enter a PIN and it authenticates them. This is opposed to a static password.”
 
Asked how far off this concept is, Hart said that it can be done now and, with the increase in BAD (Bring Any Device), it is all about authenticating the user via their device.
 
“Essentially, as the adoption of cloud continues to increase, more and more companies are going to move towards cloud-based authentication. As a result, we can expect to see more enhancements of cloud SaaS based services moving forwards, such as the inclusion of single sign-on.”
 
Wendy Nather, research director of the enterprise security practice at 451 Research, said: “There are a lot of vendors coming out of the woodwork with a single sign-on for cloud — either as an on-premise application or appliance, or actually hosted by them in the cloud. Fewer are offering identity and access management as a SaaS; some are doing the provisioning part but not the authentication.”
 
Paul Simmonds, CEO of the Global Identity Foundation, said that he felt that Hart’s view was along the right lines, especially given the current available technology. “The banks are doing a lot of this right now – augmenting weak authentication with a lot of other attributes and behaviours to ensure it’s not fraudulent,” he said.
 
“The banks are being responsible in trying to get their risk calculation to an acceptable level by augmenting (for the most part) Chip and PIN with a whole load of heuristics and other checks. Chip and PIN is probably better than passwords; probably down to the fact that they are not passwords; and thus the user has to use something different.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Yahoo beats down malvertising worry

Next Post

The Site for our Community

Recent News

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023
New AT&T Cybersecurity USM Anywhere Advisors Service Helps to Establish and Maintain Threat Detection and Response Effectiveness

Should Your Organization Be Worried About Insider Threats?

March 17, 2023
Guild Education controls API abuse with Salt Security

Guild Education controls API abuse with Salt Security

March 16, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information