Secure user and consumer authentication methods News
December 20, 2010
Authentication technology helps thwart online banking fraud but determined criminals can circumvent it.
September 27, 2010
Security researchers say malware has new functionality that targets mobile authentication used by banks.
April 26, 2010
An incident involving shared passwords at the financial services firm illustrates the critical need to control user access.
April 16, 2010
Changes in upcoming version of Adobe Flash Player will mean banks and others can't rely on Flash LSOs to authenticate customers' PCs.
Secure user and consumer authentication methods Get Started
Bring yourself up to speed with our introductory content
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display. Continue Reading
Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial ... Continue Reading
A transaction authentication number (TAN) is a type of single-use password used for an online banking transaction in conjunction with a standard ID and password. TANs are often in a list made by a financial institution and sent to the owner of the ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Secure user and consumer authentication methods Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
How does mobile microfinancing service M-Pesa allow users to make transactions without a bank account? Expert Michael Cobb explains how it works and M-Pesa security measures. Continue Reading
Banks are required to deploy multifactor authentication to secure online banking and meet FFIEC requirements. In this tip, Dave Shackleford describes some of the pros and cons associated with traditional forms of multifactor authentication as well ... Continue Reading
Multifactor consumer authentication is a must-have for financial services firms, but there are a number of different types of multifactor authentication technology from which to choose. In this tip, contributor Judith M. Myerson addresses the pros ... Continue Reading
Manage Secure user and consumer authentication methods
Learn to apply best practices and optimize your operations.
Tough times and ongoing challenges in the financial services industry have led many organizations to step up their identity management efforts. In this tip, Mark Diodati explains how financial firms are using authentication and provisioning tools to... Continue Reading
During these tumultuous times in the financial industry, your organization's identity and access management efforts need to be stronger than ever. Disgruntled employees, mergers and acquisitions and hackers are just a few of the growing threats to ... Continue Reading
Privileged password management is a pain point at many financial services firms. They're costly, hard to tame and not always secured properly. In this tip, learn how to create the foundation for your privileged password management program. Continue Reading
Problem Solve Secure user and consumer authentication methods Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With so many records containing personally identifiable information lost in data breaches, we have lost the battle to protect personal information, argues George Tubin of TowerGroup. In this tip, he explains how financial institutions must treat PII... Continue Reading
In this presentation from Financial Information Security Decisions, David Sherry, former vice president of enterprise identity and access management at Citizen's Financial Group explains how to make the business case for IAM. Continue Reading
Entitlement management can be a costly and time consuming. Access control expert Tony Bradley explains how an entitlement management system can help. Continue Reading