Exploring the differences between out-of-band and in-band authentication

Exploring the differences between out-of-band and in-band authentication

Written By: Admin

When researching and analyzing authentication solutions, people look to see how secure the solution is, how easy it is to use and if it features multiple authentication factors. However, there’s another criteria that influences how effective an authentication solution is – whether it features in-band or out-of-band authentication.

Access Granted recently had the opportunity to record a podcast with Authomate CTO, Piyush Bhatnagar. During our conversation, Piyush discussed the differences between out-of-band and in-band authentication, what makes out-of-band more secure, and the kinds of cyber attacks that out-of-band authentication helps to mitigate.

Piyush also provided some examples of different organizations currently utilizing out-of-band authentication, and the tools they’re using.

Here is what Piyush had to say:

Check Out Technology Podcasts at Blog Talk Radio with Access Granted Radio on BlogTalkRadio

1 Comment

  1. Attacking the gaps in traditional security - Access Granted
    Attacking the gaps in traditional security - Access Granted2 years ago

    […] bad actors. If it’s in-band, chances are that the solution still leaves them vulnerable (click HERE for a good introduction to the differences between in-band and out-of-band authentication). Then […]

Leave a Reply