Welcome!

Java IoT Authors: Zakia Bouachraoui, Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White

Related Topics: @CloudExpo, Agile Computing, Cloud Security

@CloudExpo: Article

Adaptive Two-Factor Authentication | @CloudExpo #WebPerf #Microservices

End users want speed, stability and consistency in their login methods

It's a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the fatally flawed password or hard token two-factor authentication (2FA) approach to keep their systems secure. As a result, adaptive authentication has gained popularity as it reduces the time it takes to login by verifying a user based on their location.

End users want speed, stability and consistency in their login methods. If a user attempts to verify their identity using adaptive authentication in a non trusted location, they will be asked to use the full 2FA process. This requires entering a code generated on a soft or hard token depending on the technology used. If the user is using this approach less than once a week, they are likely to run into complications - forgetting the process or even their hard token.

Adaptive authentication works by granting users access using just their user name and password if they are in a trusted location. Although this in theory process makes it easier for a user to authenticate their identity, there are a number of issues with this technology, which many may not realise. There are three ways of achieving adaptive authentication, and it's important for CIOs to consider the differences.

  1. GeoIP: This is detecting a user's geo position via their IP address. However, it has a number of issues. Internet service provides often change IP addresses of private users to prevent them from running their own servers at home. This means that when an IP address is switched, a user's location could appear to be somewhere 200 miles away, flagging them as now being in an unsecure location. The home of the user now assigned to the old IP address, has also suddenly become a trusted site.
  2. Using a GPS location: This method requires an app to be installed on a user's mobile device. Whilst this is infinitely more precise, employers can track the location of their staff whenever the device is on, raising serious questions on privacy. The future of adaptive outreach is to use the local base transceiver station's GSM cell ID to identify the location of a user's mobile phone and therefore verify their identity. With this method, neither the organization, nor the 2FA security provider knows the location of the user.
  3. Near Field Communication (NFC): based mobile authentication is the ultimate solution for both the CIO and the end user. This authentication method is so quick, simple and secure, which means that there's no need for it to be adaptive. For example, NFC can securely transfer all the information required to enable a browser to start up, connect to the required URL and then automatically enter the user ID, password and second factor passcode in one seamless logon. NFC isn't just limited to mobile phones either. Wearable technology, highly personal in nature, can also be utilized, enabling users to authenticate using their smart watch by simply tapping their wrists against a corresponding device.

Overall, NFC provides a solution that's even quicker than entering a simple user name and password. The CIO is then safe in the knowledge that their end points are covered, and the user is happy authenticating their way.

More

More Stories By Steve Watts

Steve Watts is co-founder of SecurEnvoy. He brings 25 years’ of industry experience to his role at the helm of Sales & Marketing for SecurEnvoy. He founded the company with Andrew Kemshall in 2003 and still works tirelessly to grow the company in new and established markets. His particular value is market and partner strategy; having assisted in the development and design of the products, designed the pricing strategy and recurring revenue model that has been so key to the businesses growth and success.

Before starting SecurEnvoy, Steve was responsible for setting up nonstop IT, the UK’s first IT security reseller in 1994. Prior to setting out on his own, Steve worked as Sales Director at the networking and IT division of Comtec, and had started his career in office solution sales in 1986.

Outside of work, Steve is a keen rugby fan. He also enjoys sailing, mountain biking, golf and skiing

IoT & Smart Cities Stories
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...