SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
What's Driving Authentication-as-a-Service?
A Q&A With Confident Technologies' CTO, Roman Yudkin
In light of the recent article in Dark Reading "Authentication-as-a-Service Gains Steam", we thought
we'd ask Confident Technologies' Roman Yudkin to expand a little on his opinion about
what's driving the growth behind authentication-as-a-service and what challenges remain.
Q: What are the major factors driving growth in the
authentication-as-a-service (AaaS) sector?
A: While hosted authentication solutions may seem like
something that would be adopted by small to midsize businesses,
we’re actually seeing an increasing number of large enterprises
are beginning to adopt authentication-as-a-service (AaaS),
particularly large enterprises that have consumer-facing websites
and services. Authentication processes directly influence
consumer’s perception of trust, especially in areas like online
banking and retail – the authentication process is often the aspect of security that is most
visible to users.
The growth of AaaS is being driven by the larger trend that is the fast growing adoption of
strong authentication solutions (including two-factor and federated authentication solutions
among others). Consumers are conducting more sensitive online transactions now than ever
before – from online banking to managing retirement funds and stock portfolios online, to
shopping, to simply having more sensitive, personal information accessible in their email and
social networking accounts. This has, of course, led to an increasing number of online threats.
At the same time, there are a growing number of regulations around strong authentication that
businesses must comply with. For these reasons, more companies are realizing that they need
stronger authentication methods than a simple username/password scheme built in-house and
they’re turning toward hosted solutions to solve the challenges. They realize that they need to
improve their security and authentication practices, but they may not have the expertise in
house to create or manage a strong authentication or two-factor authentication system
themselves.
A hosted authentication solution can bring to businesses the following benefits:








Improved reliability and scalability
Reduced online fraud
Ability to meet regulatory requirements (FFIEC, HIPAA)
Quicker deployment
No need for the in-house expertise or large monetary investment needed to build a two-factor
authentication system and associated infrastructure from scratch
No need for dedicated personnel to manage the authentication solution or stay ahead of the
latest emerging threats
An AaaS provider has the benefit of being able to see aggregated data across numerous
enterprises and identify large-scale attacks or security threats that are occurring across
multiple sites, and use this knowledge to help protect their other customers from such threats.
While of course there are strong drivers for secure authentication solutions in the financial
services market, we’re seeing authentication-as-a-service grow in many sectors including
healthcare and online retail.

Q: What are the major challenges still facing the market?
A: One of the major challenges facing the maturation of the market centers around costs and
whether or not businesses place enough value on authentication to allocate the money for a
hosted solution. There are many long-engrained, bad habits around authentication and some
businesses and IT professionals still believe that a simple username/password scheme is good
enough because that is the way authentication has always been done. Many businesses even
allocate an assigned budget to cover the costs of online fraud rather than spending the money
to invest in new technologies or to pay for a hosted authentication service that would increase
security and reduce fraud.
Some businesses, especially those that have consumer-facing websites or services fear that a
stronger authentication system (such as a two-factor authentication solution) would introduce
too much “friction” or inconvenience to the user. So, they stick with the traditional
username/password scheme because that’s what consumers are familiar with, even though it’s
less secure.
To drive growth and the maturation of the market, businesses need to place a higher value and
importance on the authentication process and need to not be afraid to require users to be
engaged in their own security. I think we’re seeing more recognition of that today after major
online password breaches like the one at Sony. Businesses are seeing that the fallout of such a
breach has a lasting negative impact on the business and the brand. A hosted authentication
service can help provide the necessary balance of strong authentication and ease-of-use more
than a solution built in-house may be able to.

Contenu connexe

Plus de Market Engel SAS

_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese
Market Engel SAS
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
Market Engel SAS
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
Market Engel SAS
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
Market Engel SAS
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Market Engel SAS
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
Market Engel SAS
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
Market Engel SAS
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
Market Engel SAS
 
H2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsH2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_stats
Market Engel SAS
 
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
Market Engel SAS
 

Plus de Market Engel SAS (20)

_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese
 
Happy new year mmxvi
Happy new year mmxviHappy new year mmxvi
Happy new year mmxvi
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-program
 
Happy new year 2015 !
Happy new year 2015 !Happy new year 2015 !
Happy new year 2015 !
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
AuditMyApps_English
AuditMyApps_EnglishAuditMyApps_English
AuditMyApps_English
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZ
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's survey
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
 
Gamers in the UK
Gamers in the UKGamers in the UK
Gamers in the UK
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
 
H2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsH2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_stats
 
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

What's driving authentication as-a-service_a q&a with confident technologies' cto, roman yudkin

  • 1. What's Driving Authentication-as-a-Service? A Q&A With Confident Technologies' CTO, Roman Yudkin In light of the recent article in Dark Reading "Authentication-as-a-Service Gains Steam", we thought we'd ask Confident Technologies' Roman Yudkin to expand a little on his opinion about what's driving the growth behind authentication-as-a-service and what challenges remain. Q: What are the major factors driving growth in the authentication-as-a-service (AaaS) sector? A: While hosted authentication solutions may seem like something that would be adopted by small to midsize businesses, we’re actually seeing an increasing number of large enterprises are beginning to adopt authentication-as-a-service (AaaS), particularly large enterprises that have consumer-facing websites and services. Authentication processes directly influence consumer’s perception of trust, especially in areas like online banking and retail – the authentication process is often the aspect of security that is most visible to users. The growth of AaaS is being driven by the larger trend that is the fast growing adoption of strong authentication solutions (including two-factor and federated authentication solutions among others). Consumers are conducting more sensitive online transactions now than ever before – from online banking to managing retirement funds and stock portfolios online, to shopping, to simply having more sensitive, personal information accessible in their email and social networking accounts. This has, of course, led to an increasing number of online threats. At the same time, there are a growing number of regulations around strong authentication that businesses must comply with. For these reasons, more companies are realizing that they need stronger authentication methods than a simple username/password scheme built in-house and they’re turning toward hosted solutions to solve the challenges. They realize that they need to improve their security and authentication practices, but they may not have the expertise in house to create or manage a strong authentication or two-factor authentication system themselves. A hosted authentication solution can bring to businesses the following benefits:        Improved reliability and scalability Reduced online fraud Ability to meet regulatory requirements (FFIEC, HIPAA) Quicker deployment No need for the in-house expertise or large monetary investment needed to build a two-factor authentication system and associated infrastructure from scratch No need for dedicated personnel to manage the authentication solution or stay ahead of the latest emerging threats An AaaS provider has the benefit of being able to see aggregated data across numerous enterprises and identify large-scale attacks or security threats that are occurring across multiple sites, and use this knowledge to help protect their other customers from such threats.
  • 2. While of course there are strong drivers for secure authentication solutions in the financial services market, we’re seeing authentication-as-a-service grow in many sectors including healthcare and online retail. Q: What are the major challenges still facing the market? A: One of the major challenges facing the maturation of the market centers around costs and whether or not businesses place enough value on authentication to allocate the money for a hosted solution. There are many long-engrained, bad habits around authentication and some businesses and IT professionals still believe that a simple username/password scheme is good enough because that is the way authentication has always been done. Many businesses even allocate an assigned budget to cover the costs of online fraud rather than spending the money to invest in new technologies or to pay for a hosted authentication service that would increase security and reduce fraud. Some businesses, especially those that have consumer-facing websites or services fear that a stronger authentication system (such as a two-factor authentication solution) would introduce too much “friction” or inconvenience to the user. So, they stick with the traditional username/password scheme because that’s what consumers are familiar with, even though it’s less secure. To drive growth and the maturation of the market, businesses need to place a higher value and importance on the authentication process and need to not be afraid to require users to be engaged in their own security. I think we’re seeing more recognition of that today after major online password breaches like the one at Sony. Businesses are seeing that the fallout of such a breach has a lasting negative impact on the business and the brand. A hosted authentication service can help provide the necessary balance of strong authentication and ease-of-use more than a solution built in-house may be able to.