New & Notable
Secure user and consumer authentication methods News
December 20, 2010
Authentication technology helps thwart online banking fraud but determined criminals can circumvent it.
September 27, 2010
Security researchers say malware has new functionality that targets mobile authentication used by banks.
April 26, 2010
An incident involving shared passwords at the financial services firm illustrates the critical need to control user access.
April 16, 2010
Changes in upcoming version of Adobe Flash Player will mean banks and others can't rely on Flash LSOs to authenticate customers' PCs.
Secure user and consumer authentication methods Get Started
Bring yourself up to speed with our introductory content
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.... Continue Reading
Real ID is a driver's license that complies with standards mandated by the United States Real ID Act of 2005. (Continued...) Continue Reading
Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other... (Continued) Continue Reading
Evaluate Secure user and consumer authentication methods Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Banks are required to deploy multifactor authentication to secure online banking and meet FFIEC requirements. In this tip, Dave Shackleford describes some of the pros and cons associated with traditional forms of multifactor authentication as well ... Continue Reading
Multifactor consumer authentication is a must-have for financial services firms, but there are a number of different types of multifactor authentication technology from which to choose. In this tip, contributor Judith M. Myerson addresses the pros ... Continue Reading
Manage Secure user and consumer authentication methods
Learn to apply best practices and optimize your operations.
Tough times and ongoing challenges in the financial services industry have led many organizations to step up their identity management efforts. In this tip, Mark Diodati explains how financial firms are using authentication and provisioning tools to... Continue Reading
During these tumultuous times in the financial industry, your organization's identity and access management efforts need to be stronger than ever. Disgruntled employees, mergers and acquisitions and hackers are just a few of the growing threats to ... Continue Reading
Privileged password management is a pain point at many financial services firms. They're costly, hard to tame and not always secured properly. In this tip, learn how to create the foundation for your privileged password management program. Continue Reading
Problem Solve Secure user and consumer authentication methods Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With so many records containing personally identifiable information lost in data breaches, we have lost the battle to protect personal information, argues George Tubin of TowerGroup. In this tip, he explains how financial institutions must treat PII... Continue Reading
In this presentation from Financial Information Security Decisions, David Sherry, former vice president of enterprise identity and access management at Citizen's Financial Group explains how to make the business case for IAM. Continue Reading
Entitlement management can be a costly and time consuming. Access control expert Tony Bradley explains how an entitlement management system can help. Continue Reading