Intelligent CISO Issue 01 | Page 21

Across an enterprise , there are many different roles and requirements for security and authentication . the need for a consumer-simple experience , one that provides access control commensurate with the risk of a given transaction . MFA , SSO , authentication standards , biometrics and smartphones will each continue to play a role as the market moves toward risk-aware authentication . So watch this space !
cyber trends method for an employee who routinely accesses lower-risk applications than for a privileged user . Yet this does not mean you need to abandon standardisation . Several emerging open standards and protocols for multi-factor authentication are making it possible to meet diverse user needs and still have consistent integration processes and user experiences across systems , devices and apps . This means that you can employ the same standards and protocols to incorporate and administer both .
4 . Biometrics that live up to the hype : Biometrics have been talked about for years and you can be forgiven for having an ‘ I ’ ll believe it when I see it ’ attitude to these promises . However , biometrics are finally coming into their own and we are starting to see them become a common method for enterprise authentication . Providing a fingerprint or retina scan may be easy for the user but getting to this point has historically been costly and a complex challenge for enterprises to solve . Today however , with a maturing ecosystem of biometricready smartphones – coupled with the adoption of open standards – the stars finally seem to be aligning for the broader adoption of biometrics .
5 . Mobile identity : Smartphonebased authentication is becoming increasingly popular but it still poses challenges . Sure , you can use advanced authentication tools such as biometrics to provide assurance that the phone ’ s owner is the one using the phone ; but how do you know if the phone itself can be trusted ? This is the big question the industry is starting to step up to and address . We ’ re seeing phone manufacturers trying to establish a verifiable ID that will enable organisations to feel more confident about extending trust to a device .
The increased popularity of enterprise mobile applications only heightens

Across an enterprise , there are many different roles and requirements for security and authentication . the need for a consumer-simple experience , one that provides access control commensurate with the risk of a given transaction . MFA , SSO , authentication standards , biometrics and smartphones will each continue to play a role as the market moves toward risk-aware authentication . So watch this space !

Keeping ahead of trends in this area can not only help to provide security teams with peace of mind , but to also make life easier for users . Yet for these techniques to be effective , they need to be evaluated with the business in mind . The most important thing is to work out what is right for your individual business ; where are your most ‘ risky ’ users , what applications or systems have the most vital company data and what kind of access do each of your users really need ?
These kinds of questions will help you focus your identity strategy on the needs of the business . Taking this businessdriven security approach will not only help to lower costs but will also reduce risks and improve the user experience . u www . intelligentciso . com | Issue 01
21