Intelligent CISO Issue 1 - Page 21

cyber trends method for an employee who routinely accesses lower-risk applications than for a privileged user. Yet this does not mean you need to abandon standardisation. Several emerging open standards and protocols for multi-factor authentication are making it possible to meet diverse user needs and still have consistent integration processes and user experiences across systems, devices and apps. This means that you can employ the same standards and protocols to incorporate and administer both. 4. Biometrics that live up to the hype: Biometrics have been talked about for years and you can be forgiven for having an ‘I’ll believe it when I see it’ attitude to these promises. However, biometrics are finally coming into their own and we are starting to see them become a common method for enterprise authentication. Providing a fingerprint or retina scan may be easy for the user but getting to this point has historically been costly and a complex challenge for enterprises to solve. Today however, with a maturing ecosystem of biometric- ready smartphones – coupled with the adoption of open standards – the stars finally seem to be aligning for the broader adoption of biometrics. | Issue 01 5. Mobile identity: Smartphone- based authentication is becoming increasingly popular but it still poses challenges. Sure, you can use advanced authentication tools such as biometrics to provide assurance that the phone’s owner is the one using the phone; but how do you know if the phone itself can be trusted? This is the big question the industry is starting to step up to and address. We’re seeing phone ՙɕ́她Ѽ)хٕ͠ɥ%ѡЁݥ)ɝͅѥ́Ѽɔ)ЁѕЁѼ٥)Qɕ͕ձɥ䁽ѕɥ͔)ѥ́䁡ѕ)ɽ́)ѕɥ͔ѡɔɔ)䁑ɕЁɽ)ɕեɕ)ȁ͕ɥ䁅)ѡѥѥ)ѡȁյȵͥ)ɥѡЁɽ٥)́ɽɅє)ݥѠѡɥٕͬ)Ʌͅѥ5)MM<ѡѥѥ)хɑ̰ɥ)͵́ݥ)ѥՔѼ䁄ɽ́ѡ)ɭЁٕ́ѽ݅ɐɥͬ݅ɔ)ѡѥѥM݅эѡ́)-ɕ́ѡ́ɕ)Ё䁡Ѽɽ٥͕ɥ)ѕ́ݥѠЁѼͼ)ͥȁȁ̸͕eЁȁѡ͔)ѕՕ́Ѽѥٔѡ䁹)ѼمՅѕݥѠѡͥ́)QЁхЁѡ́Ѽ)ݽɬЁݡЁ́ɥЁȁȁ٥Յ)ͥݡɔɔȁЃaɥͭd)͕̰ݡЁѥ́ȁѕ)ٔѡЁ٥х䁑ф)ݡЁ́)͕́ɕ䁹)Q͔́Օѥ́ݥ)́ȁѥɅѕ䁽ѡ)ѡ̸ͥQѡ̴́ͥ)ɥٕ͕ɥ䁅ɽݥЁ)Ѽݕȁ́ЁݥͼɕՍ)ɥͭ́ɽٔѡ͕ȁɥ(