IT Decision Makers Reveal Two-Factor Authentication Dislike and Rise in Adaptive Authentication Adoption

Rise in Adaptive Authentication Adoption

 

Findings show 74 percent of respondents who use two-factor authentication admit that they receive complaints

IRVINE, Calif. – Jan. 11, 2017 – SecureAuth® Corporation, the leader in adaptive access control, today announced the results of a survey that reveals challenges associated with two-factor authentication (2FA). Commissioned in conjunction with Amplitude Research, the responses surveyed 300 IT decision makers and cybersecurity professionals on industry perspectives and concerns with 2FA.

SecureAuth Goes Beyond Two-Factor Authentication

SecureAuth Goes Beyond Two-Factor Authentication

 

While many of today’s organizations have made the shift to cloud-native infrastructures, for others doing so can still be challenging. In particular, older companies may find themselves dealing with legacy software and on-premise systems with security standards that may not be able to translate seamlessly to the cloud without first taking a hybrid approach.

Information Age: Organisations Are Ready to Phase Out Passwords. Are You?


Organisations are ready to phase out passwords. Are you?

What are the main hindrances stopping the adoption of authentication strategies, and will passwords be around for much longer?

Single-factor, password-based authentication – and even many traditional two-factor approaches – are no longer enough to secure today’s increasingly digital world.

SecureAuth in the News at IP EXPO LIVE Europe 2016

 

Listen in as James Romer, Chief Security Architect - Europe, is interviewed by IP EXPO Live about SecureAuth. Romer quickly sums up our access control with adaptive authentication solution, "We make sure you are who you say you are - from wherever you are!"

 

Security School is in Session: SecureAuth University

SecureAuth University
Author: 
Rohit Khanna

If you’ve been paying attention, you know that we’ve been on a roll here at SecureAuth. The Connected Security Alliance, the newest version of IdP, Cloud Access – these are exciting times for us, because we’ve been able to unleash so many advances in IT security.

SecureAuth Launches SecureAuth University Cybersecurity Certification Program

University Empowers Industry Professionals to Build Expertise Amidst Evolving Cyberattack Tactics and Widening IT Security Skills Gap 

 

Eliminating white space between security products

 

There were over 3,141 confirmed data breaches in 2015 and that doesn't include the ones that were never reported or detected. Yahoo's recent attack involved at least 500 million user accounts. Clearly the security problem is getting worse, not better.

Connected Security: A Holistic Approach to Solving the Data Breach Problem

In 2015 alone, over 750 cyber attacks were reported globally – with many more never reported or even detected. Enterprises deploy security point solutions in the hopes of stopping a data breach, while savvy attackers work to exploit the whitespace between them.

Two-Factor Fallacy: 99% Still Believe Two-Factor Authentication is Enough

Two-Factor Fallacy
Author: 
Craig Lund

On the heels of recent mega breaches in which usernames, passwords and security responses were compromised, there’s a growing movement from individuals and businesses for an authentication overhaul. Clearly single-sign on, password-based authentication – and even more traditional two-factor approaches are no longer enough in today’s digital world.

Pages