News, news analysis, and commentary on the latest trends in cybersecurity technology.
Security leaders are interested in continuous authentication technologies, especially behavioral-based capabilities.
Recent data breaches and incidents show that authentication continues to be a big problem for enterprises. Attackers increasingly focus on intercepting credentials to log in to user accounts or figuring out ways to get privileged access to the network. Data from the Dark Reading and Omdia Enterprise Security in a Post Pandemic World report shows security leaders are interested in continuous authentication technologies that constantly vet and verify user identities and privileges before granting access. In the report, almost half of the respondents say they are either already using, or plan to deploy, continuous authentication technologies within the next 18 months. Of the ones who are already using these technologies, they appear evenly divided on whether they use presence-based, behavioral-based, or biometrics capabilities.
While biometrics such as fingerprints get the most attention in the authentication space, only 34% of the respondents say they are considering biometrics capability as part of their continuous authentication plans. Most of the security leaders, at 45%, appear to be considering behavior-based continuous authentication mechanisms, which typically monitor user and device behavior for anomalous activity before granting access. For 40% of respondents, presence-based continuous authentication mechanisms, which typically consist of a password and some other form of secondary or even tertiary authentication by the user, continue to loom large in their deployment plans.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024