PODCAST – The effectiveness of location and intent as authentication factors

PODCAST – The effectiveness of location and intent as authentication factors

Written By: Admin

In previous posts on Access Granted, we’ve discussed the need for multifactor authentication for both consumers and enterprises, and have discussed some of the different authentication factors that today’s solutions utilize to ensure that a user is – in fact – who they say they are.

The authentication and security industry has seen many disparate authentication factors and devices gain traction. From key fobs with constantly updating codes, to PIN numbers and even biometrics, there is a huge ecosystem of different factors that authentication solutions can chose from to determine a user’s identity.

However, there are two factors that are rather new to the marketplace that are the subject of increased buzz and attention in the security industry – location and intent. In fact, one location-focused, two-factor authentication solution – Toopher – sold to Salesforce in early April. This deal illustrates the interest the industry has in both multifactor authentication – and location as an authentication factor.

To get a better understanding of how location and intent can be utilized for authentication purposes – and the reasons why enterprises are so interested – we sat down with Authomate’s CEO, Jeff Schmidt. In our podcast conversation, Jeff shared how location and intent are determined by these authentication solutions, why these factors are effective for authentication and the different kinds of security threats they can help eliminate.

Here is what Jeff had to say:

Check Out Technology Podcasts at Blog Talk Radio with Access Granted Radio on BlogTalkRadio

For additional information about Authomate and their authentication solutions that combine ease-of-use with strong, four-factor authentication – including location – go to their Website at www.authomate.com.

1 Comment

  1. Hacking two-factor authentication – an old problem in need of a new solution - Access Granted
    Hacking two-factor authentication – an old problem in need of a new solution - Access Granted2 years ago

    […] solutions that can gauge a user’s intent, location and authenticity, go to http://www.authomate.com, or listen to this recent podcast featuring Jeff […]

Leave a Reply