Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Adaptive Two-Factor Authentication | @CloudExpo #WebPerf #Microservices
End users want speed, stability and consistency in their login methods

It's a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the fatally flawed password or hard token two-factor authentication (2FA) approach to keep their systems secure. As a result, adaptive authentication has gained popularity as it reduces the time it takes to login by verifying a user based on their location.

End users want speed, stability and consistency in their login methods. If a user attempts to verify their identity using adaptive authentication in a non trusted location, they will be asked to use the full 2FA process. This requires entering a code generated on a soft or hard token depending on the technology used. If the user is using this approach less than once a week, they are likely to run into complications - forgetting the process or even their hard token.

Adaptive authentication works by granting users access using just their user name and password if they are in a trusted location. Although this in theory process makes it easier for a user to authenticate their identity, there are a number of issues with this technology, which many may not realise. There are three ways of achieving adaptive authentication, and it's important for CIOs to consider the differences.

  1. GeoIP: This is detecting a user's geo position via their IP address. However, it has a number of issues. Internet service provides often change IP addresses of private users to prevent them from running their own servers at home. This means that when an IP address is switched, a user's location could appear to be somewhere 200 miles away, flagging them as now being in an unsecure location. The home of the user now assigned to the old IP address, has also suddenly become a trusted site.
  2. Using a GPS location: This method requires an app to be installed on a user's mobile device. Whilst this is infinitely more precise, employers can track the location of their staff whenever the device is on, raising serious questions on privacy. The future of adaptive outreach is to use the local base transceiver station's GSM cell ID to identify the location of a user's mobile phone and therefore verify their identity. With this method, neither the organization, nor the 2FA security provider knows the location of the user.
  3. Near Field Communication (NFC): based mobile authentication is the ultimate solution for both the CIO and the end user. This authentication method is so quick, simple and secure, which means that there's no need for it to be adaptive. For example, NFC can securely transfer all the information required to enable a browser to start up, connect to the required URL and then automatically enter the user ID, password and second factor passcode in one seamless logon. NFC isn't just limited to mobile phones either. Wearable technology, highly personal in nature, can also be utilized, enabling users to authenticate using their smart watch by simply tapping their wrists against a corresponding device.

Overall, NFC provides a solution that's even quicker than entering a simple user name and password. The CIO is then safe in the knowledge that their end points are covered, and the user is happy authenticating their way.

More

About Steve Watts
Steve Watts is co-founder of SecurEnvoy. He brings 25 years’ of industry experience to his role at the helm of Sales & Marketing for SecurEnvoy. He founded the company with Andrew Kemshall in 2003 and still works tirelessly to grow the company in new and established markets. His particular value is market and partner strategy; having assisted in the development and design of the products, designed the pricing strategy and recurring revenue model that has been so key to the businesses growth and success.

Before starting SecurEnvoy, Steve was responsible for setting up nonstop IT, the UK’s first IT security reseller in 1994. Prior to setting out on his own, Steve worked as Sales Director at the networking and IT division of Comtec, and had started his career in office solution sales in 1986.

Outside of work, Steve is a keen rugby fan. He also enjoys sailing, mountain biking, golf and skiing

Latest Cloud Developer Stories
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even cod...
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchai...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSy...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE