PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

The Rapidly Changing Authentication Infrastructure

By Tim Sloane
November 28, 2017
in Analysts Coverage
0
2
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Biometrics Eye Scan

Biometrics Eye Scan

Mercator predicted mobile devices would require a rapid shift in authentication methods here and here. This article in CSO Online introduces the apt term of “Goldilocks zone” to describe when individuals should be challenged with a multi-factor authentication:

“I recently read a story in CSO that explained how hackers can crack just about any password. The story didn’t surprise me. Security experts have known this for a while. Yet, passwords continue to serve as the go-to method for accessing just about everything online.

Most experts recommend adding multi-factor authentication, but with the wide range of cloud services available and the mobility of our workforce, how much is too much?  How little is too little to be effective?

Companies need to strike a balance between users reaffirming who they are without inhibiting their work. The best-case scenario entails an employee, who’s doing what she normally does, is left alone. If she suddenly does something out of the ordinary, she would need to verify it’s really her. Verify users are who they say they are when they are already inside doing something unusual, not only when they are at the door.

Credit card companies have become very good at this process. They understand cardholders’ regular purchases, and thus don’t bother them every time they use their card. However, if a purchase seems unusual, the card company will send a text asking the card holder to verify it’s her. If she cannot verify the purchase, they freeze her account. Sounds simple, right?

We need this kind of simplicity in cyber security. Companies cannot apply multi-factor authentication to everything a user does. It’s too much. There’s a Goldilocks zone for multi-factor. It can’t be too hot. It can’t be too cold. It must be just right. And companies can pull off just right by using behavior analytics.”

The two publications also identified behavioral biometrics as a key component of the overall authentication solution but also suggested that it be implemented right away to detect robots and account takeovers and then expanded into the general authentication solution set as the organization develops risk profiles for all of its consumer and business interactions as also identified in this article:

“Behavior analytics working in tandem with multi-factor authentication would enable companies to verify users are who they say they are when they are detected doing something unusual. For example, we often see a use case that we call “The Prospector.” Like a gold miner digging for gold, insiders will mine for valuable data assets, accessing applications and systems, looking for the crowned jewels. Behavior analytics would detect an employee digging around, accessing a system that he typically doesn’t access and/or isn’t authorized to access. Multi-factor authentication would then come into play asking the employee to verify it’s really him. If he does not verify within a certain timeframe, then his account is shut down before he accesses the jewels. On the flip side, if that employee is accessing a system that he typically accesses to do his job, he wouldn’t be bothered at all.

Call it “Smart Multi Factor Authentication.” A bad actor would fail the second layer of authentication while the trusted employee can do his job uninterrupted. Malicious insiders would also be hindered because they know they are being watched.”

 

Overview by Tim Sloane, VP, Payments Innovation at Mercator Advisory Group

Read the full story here

2
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: Authentication

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    ai phishing

    The Fraud Epidemic Is Testing the Limits of Cybersecurity

    February 6, 2026
    stablecoins b2b payments

    Stablecoins and the Future of B2B Payments: Faster, Cheaper, Better

    February 5, 2026
    Payment Facilitator

    The Payment Facilitator Model as a Growth Strategy for ISVs

    February 4, 2026
    Simplifying Payment Processing? Payment Orchestration Can Help , multi-acquiring merchants

    Multi-Acquiring Is the New Standard—Are Merchants Ready?

    February 3, 2026
    ACH Network, credit-push fraud, ACH payments growth

    What’s Driving the Rapid Growth in ACH Payments

    February 2, 2026
    chatgpt payments

    How Merchants Should Navigate the Rise of Agentic AI

    January 30, 2026
    fraud passkey

    Why the Future of Financial Fraud Prevention Is Passwordless

    January 29, 2026
    payments AI

    When Can Payments Trust AI?

    January 28, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result