| |||||||||
| |||||||||
Current Filter: Security>>>>>> 2014: Into The Unknown Editorial Type: Masterclass Date: 11-2013 Views: 2840 Key Topics: Security Smartphones Authentication GPS Biometrics Passwords Key Companies: Celestix Google Key Products: Google Glass iPhone Key Industries: | |||
| We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager
With 2013 now firmly behind us, it's a perfect time to look ahead to the New Year and consider what trends we are likely to encounter.
The most exciting thing I see coming is the continued need to evolve ways in which to authenticate our trusted users, while simplifying the log-in process, decreasing the user interaction and lowering the cost. Let's consider for a moment the emergence of wearable tech. Google Glass, intelligent watches and the continued evolution of the smartphone all lead us to a more consumerised 'always on' and 'always accessible' work environment. So how will the security market embrace these new and rapidly developing technologies?
BOND-STYLE TECH In the business world, however, what authentication trends will most organisations be considering in the next twelve months? For me, there is one area of the authentication market that makes great sense when we consider the context of access from more and more connected devices: adaptive authentication. This is a concept that allows an organisation to dynamically prompt a user for additional credentials, in the event that their level of trust does not meet corporate policy. For instance, the user could enter the correct credentials, but their request to log in may be from a geographic region where they don't usually work. The request may well be legitimate, but, by asking for additional credentials, an organisation can be surer of the trusted identity of the user.
PERSONAL IDENTIFIERS Looking ahead to the embryonic technologies such as Google Glass, it will be interesting to see to what extent authentication can leverage the data logged by this wearable tech. Using GPS to track the location of the user when logging on is a great example. If we know our user takes a specific route to work, or regularly stops at a coffee shop, or leaves their house at a certain time every day, then this is all data that could be addressed, analysed and used to build and determine the identity of our user, without necessarily intruding on their day-to-day activity. The extent to which we are now able to capture a biometric snapshot of our users' lives –and then transform that into a security key that can be used to access our corporate assets – is an evolutionary step that will revolutionise the way we work. CS | ||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |