Published: September 2009
Strong authentication technologies have long been used for providing an extra layer of assurance that an individual accessing computing resources is who they say they are. However, the cost of deploying and managing such systems, including the provisioning of hardware tokens and the strain on helpdesk resources dealing with lost tokens or forgotten passwords, has made their use expensive and complex. New authentication models, however, are changing all that. Key developments include next-generation authentication servers that automate all tasks involved, and services provided in the cloud. New authentication methods such as software, SMS and BlackBerry tokens are further taking the costs out of the use of strong authentication and opening up its use to a whole new range of possibilities.
As a technology, strong authentication is coming of age. Authentication systems have evolved so that the new generation of technologies automate all processes involved to remove the costs and complexity involved. New cloud-based services are now emerging that will develop into open authentication platforms whereby users can authenticate themselves once to access a range of services in a highly secure manner. Combined with industry standards, these platforms herald a future where strong digital identities will be provided for everyone for all services.
Strong authentication is not a new approach for removing the uncertainties of who is accessing what information and has always provided higher levels of security than the use of user name and password combinations alone. However, such technologies have evolved a long way from the manually intensive implementations of yesteryear. Now, efficient, fully automated systems have cut much of the cost and complexity of deploying such technologies and new cloud-based delivery models provide the ability to cut bottom-line costs yet further-something that is essential for many resource-strapped organisations facing today's economic realities. Further evolution will see cloud-based platforms opened to a wider range of constituents and, combined with new authentication methods, will provide the potential for a future where secure digital identities will be available for all users across all communications channels.
By downloading you agree to our Terms and Conditions. These include information regarding use of your personal data.
Published by: electronicdawn Ltd.