Multifactor authentication

The Case for Multimodal Biometric Authentication in the Enterprise

2019-02-12T13:22:46-04:00By |

Identity verification has always been a cornerstone of enterprise security. Businesses must be able to create identities for each of their employees, and determine the extent of access granted to those identities across physical and digital assets. They also need to authenticate the identity of users each time they attempt to access an information system [...]

How Biometrics Enhance Multifactor Authentication in the Enterprise

2019-02-12T13:25:57-04:00By |

Passwords and PINs predate the first moon landing, yet we still rely on them to access personal and professional devices and applications. Why? They can, and often are intercepted and stolen. Every time we type a username and password combination into a website or application, we transfer that information over the internet. And so hackers create fake [...]

Aware lands among Enterprise Security Magazine’s Top Ten Multifactor Authentication Solution Providers for 2018

2019-03-15T13:01:42-04:00By |

Passwords were conceived for the computing systems of the 1960s; they are insecure and inconvenient for users of today’s Internet-centric computing environment. No matter what we do to shore up their effectiveness, hackers devise new ways to defeat them. Phishing, interception, knowledge-based guessing, brute-force attacks, and large-scale data breaches make authentication based solely on passwords unacceptably vulnerable.

Mobile biometric authentication: Multimodal approaches for improved matching and spoof detection

2019-04-01T14:18:00-04:00By |

The Future of Mobile Authentication: Multimodal Biometrics - The vast majority of modern authentication implementations strive to maximize both security and convenience; that is, to: - Make it as difficult as possible for a fraudster to steal or spoof the rightful user’s authentication factors (e.g. device, password, token, biometric). - Avoid interference with access to the protected asset or service for the rightful user. - Dissuade the user from circumventing the intended security mechanisms.