- Download Now
Mobile and Web Authentication White Papers
Securing "Bring Your Own Device" (BYOD)
Traditional authentication methods are fraught with difficulties and security risks. The rise of personal smartphones and tablets in the workplace is compounding the problems because the IT departments have less control over the devices that are connecting to enterprise systems and data, or the authentication methods used to access them. This executive brief from Osterman Research discusses the challenges and describes how businesses can securely enable "Bring Your Own Device" (BYOD).
Mobile Security Survey Results
A survey conducted by Confident Technologies revealed that most smartphone and tablet owners do not password protect their devices, even though they have them connected to sensitive applications like banking and shopping apps, and work email accounts. These poor security habits are born out of frustration -- people have a hard time typing complex passwords on smartphone keyboards. Read the full survey results to learn about the realities of people's mobile security habits and what can be done to make authentication easier on mobile websites and mobile apps.
Two-Factor Authentication White Paper
Cybercriminals are increasingly targeting mobile phones and the SMS communication channel used by many businesses for two-factor authentication. Using a variant of the Zeus malware, they can intercept the authentication text messages businesses send customers and use them to authenticate their own fraudulent transactions. As attacks continue to increase, businesses need a more secure approach to two-factor authentication on mobile phones. This white paper discusses how image-based authentication creates a multi-layered authentication challenge on the second factor device to verify that it is actually the legitimate user in possession of the device and not someone else who has stolen the phone or is intercepting the communication using malware.
One-Time Passwords Using Images
Authentication on websites and cloud-based services has traditionally involved a trade-off between security and usability. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. It will describe how businesses can increase security, reduce support costs and improve the customer experience by deploying a flexible layer of authentication that is easy and intuitive for users, yet highly secure.
Strong Authentication White Paper
When implementing strong authentication on a website, IT professionals must find a balance among three separate forces whose goals are often at odds: the cost and security needs of the company, the impact on user behavior, and the motivations of the would-be attacker. This paper gives practical strategies achieving the optimal balance of security, usability and costs and it evaluates the pros and cons of various authentication approaches so IT professionals can choose what is right for their business.