SlideShare une entreprise Scribd logo
1  sur  15
THE RIGHT MIX:
THE RIGHT MIX:
November 6, 2019
•
•
•
•
•
•
4All Rights Reserved | FIDO Alliance | Copyright 2019
Andrew Shikiar
Executive Director & CMO
FIDO Alliance
Marcio Mello
Director & Head of Product Management
– Intuit Identity & Profile Platform
9,000 employees
worldwide
Powering Prosperity Around the World
19 locations
in 9 countries
$6.0 billion
in revenue
Intuit’s Identity & Authentication Priorities
Mobile First Strategy
User
experience
SecurityMFA -
Passwordless
Finding the Right Security and Usability Balance:
Benefits of standards
• Future proof
• Scalability
• Lower operational costs
Better User Experience
• Passwordless
• Fingerprint/Facial biometrics
Better Security
• Public Key Cryptography
• Privacy/No trackability
• Credentials/Biometrics never
leave device
Why FIDO
Rolling Out FIDO Authentication:
Key Steps
Criteria: security, platform
readiness, references
and costs
Nok Nok Labs S3 Platform/
iOS/Android
First platform: TurboTax
User rollout: Upgraded app,
iOS first
Vendor evaluation
Product managers,
engineers, customer care
agents and others
Internal Customer
Education
Registration, sign-in
and settings
Build Out User
Experiences
Phased launch
Migrating to FIDO
from existing solutions
The Results
78% reduction in
sign in times 6% increase in login
success rates
99.9% authentication success vs.
80-85% using SMS OTP
Shorter session times decrease
potential attack surface
Next Steps
Expand to
more services
Expand
use cases:
Additional
enhancements
Consider outsourcing components of the solution as
needed.
Have clear, well-defined goals in terms of reduction
in abuse and improvements in
user experience.
Consider the implications on your current analytics
frameworks, and how a FIDO passwordless sign in
will change the way
you measure conversion.
Have a careful plan to migrate mobile apps
from a local PIN or biometric challenge to
unlock the app to FIDO to sign in.
Advice for Rolling out FIDO
1
2
3
4
5
6
7
8
Educate product managers, engineers, customer
care agents and others within
your organization.
Consider a progressive approach to registration.
Plan a simulation or pre-launch of the new
registration and sign in process to work out any
kinks before rolling out to your wider customer
base.
Pair your FIDO implementation with a plan to
shorten security token lifetimes to realize the full
security benefits .
Plan for scalability, high availability and disaster
recovery, especially if you are moving the service
to the cloud.
Andrew Shikiar
Executive Director & CMO
FIDO Alliance
Marcio Mello
Director & Head of Product Management
– Intuit Identity & Profile Platform
If we didn’t have time to answer your question, please reach out
to us at help@fidoalliance.org
The webinar recording and slides will be emailed to you and posted on
fidoalliance.org
Please stay on to take the survey at the conclusion of the webinar
fidoalliance.org

Contenu connexe

Tendances

Tendances (20)

Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
Deployment Snapshots from Japan
Deployment Snapshots from JapanDeployment Snapshots from Japan
Deployment Snapshots from Japan
 
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
2019 FIDO TOKYO Seminar - FIDO Deployment in Korea
2019 FIDO TOKYO Seminar - FIDO Deployment in Korea2019 FIDO TOKYO Seminar - FIDO Deployment in Korea
2019 FIDO TOKYO Seminar - FIDO Deployment in Korea
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
Enhancing Security with FIDO
Enhancing Security with FIDOEnhancing Security with FIDO
Enhancing Security with FIDO
 
Integrating FIDO & Federation Protocols
Integrating FIDO & Federation ProtocolsIntegrating FIDO & Federation Protocols
Integrating FIDO & Federation Protocols
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
Enterprise Deployment of FIDO in SKT
Enterprise Deployment of FIDO in SKTEnterprise Deployment of FIDO in SKT
Enterprise Deployment of FIDO in SKT
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and Updates
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
Securing a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web AuthenticationSecuring a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web Authentication
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 

Similaire à FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication

Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
itnewsafrica
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

Similaire à FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication (20)

Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
DOCOMO Joins FIDO Alliance Board of Directors
DOCOMO Joins FIDO Alliance Board of DirectorsDOCOMO Joins FIDO Alliance Board of Directors
DOCOMO Joins FIDO Alliance Board of Directors
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process Intelligence
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
SDM: The Fundamentals of Software Delivery Management
SDM: The Fundamentals of Software Delivery ManagementSDM: The Fundamentals of Software Delivery Management
SDM: The Fundamentals of Software Delivery Management
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
SailPoint IdentityIQ – Admin and Developer.pptx
SailPoint IdentityIQ – Admin and Developer.pptxSailPoint IdentityIQ – Admin and Developer.pptx
SailPoint IdentityIQ – Admin and Developer.pptx
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentation
 
Protect SAP data with fingerprint recognition software
Protect SAP data  with fingerprint recognition softwareProtect SAP data  with fingerprint recognition software
Protect SAP data with fingerprint recognition software
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
Business model israel_v1.0
Business model israel_v1.0Business model israel_v1.0
Business model israel_v1.0
 
[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 

Plus de FIDO Alliance

Plus de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication

  • 4. 4All Rights Reserved | FIDO Alliance | Copyright 2019 Andrew Shikiar Executive Director & CMO FIDO Alliance Marcio Mello Director & Head of Product Management – Intuit Identity & Profile Platform
  • 5. 9,000 employees worldwide Powering Prosperity Around the World 19 locations in 9 countries $6.0 billion in revenue
  • 6. Intuit’s Identity & Authentication Priorities Mobile First Strategy User experience SecurityMFA - Passwordless
  • 7. Finding the Right Security and Usability Balance: Benefits of standards • Future proof • Scalability • Lower operational costs Better User Experience • Passwordless • Fingerprint/Facial biometrics Better Security • Public Key Cryptography • Privacy/No trackability • Credentials/Biometrics never leave device Why FIDO
  • 8. Rolling Out FIDO Authentication: Key Steps Criteria: security, platform readiness, references and costs Nok Nok Labs S3 Platform/ iOS/Android First platform: TurboTax User rollout: Upgraded app, iOS first Vendor evaluation Product managers, engineers, customer care agents and others Internal Customer Education Registration, sign-in and settings Build Out User Experiences Phased launch
  • 9. Migrating to FIDO from existing solutions
  • 10. The Results 78% reduction in sign in times 6% increase in login success rates 99.9% authentication success vs. 80-85% using SMS OTP Shorter session times decrease potential attack surface
  • 11. Next Steps Expand to more services Expand use cases: Additional enhancements
  • 12. Consider outsourcing components of the solution as needed. Have clear, well-defined goals in terms of reduction in abuse and improvements in user experience. Consider the implications on your current analytics frameworks, and how a FIDO passwordless sign in will change the way you measure conversion. Have a careful plan to migrate mobile apps from a local PIN or biometric challenge to unlock the app to FIDO to sign in. Advice for Rolling out FIDO 1 2 3 4 5 6 7 8 Educate product managers, engineers, customer care agents and others within your organization. Consider a progressive approach to registration. Plan a simulation or pre-launch of the new registration and sign in process to work out any kinks before rolling out to your wider customer base. Pair your FIDO implementation with a plan to shorten security token lifetimes to realize the full security benefits . Plan for scalability, high availability and disaster recovery, especially if you are moving the service to the cloud.
  • 13. Andrew Shikiar Executive Director & CMO FIDO Alliance Marcio Mello Director & Head of Product Management – Intuit Identity & Profile Platform
  • 14. If we didn’t have time to answer your question, please reach out to us at help@fidoalliance.org The webinar recording and slides will be emailed to you and posted on fidoalliance.org Please stay on to take the survey at the conclusion of the webinar

Notes de l'éditeur

  1. https://fidoalliance.org/2019-strong-authentication-report/
  2. https://fidoalliance.org/2019-strong-authentication-report/
  3. User experience. Signing in on a mobile device using a password can be frustrating – it’s easy to make mistakes when typing on a mobile device. Intuit wanted the experience of signing in to the app to be frictionless for users. Security. In today’s threat landscape, there are so many ways a hacker can take advantage of poor security in mobile devices and apps. While infrequent sign-ins are common, Intuit wanted to make the process so easy they could regularly sign users out and invalidate their tokens to help prevent unauthorized access to accounts without negatively impacting the user experience.  Account Takeover. Intuit is constantly using technology and techniques to minimize account takeover, and needed a solution that would help decrease these types of opportunities for hackers.
  4. Graphic show migration from Unlock app to Sign in to app (somehow) User experience Sign in flow
  5. ANDREW