By Tony Lock
We all know that trying to authenticate our users when they access the company’s IT systems faces one major challenge that has so far outstripped the ability of nearly all security technologies. That’s user acceptance. More accurately it is the refusal of most workers to ‘put up with’ any security solution they see as getting in their way. This applies no matter how important the system is to your business or how sensitive the data it holds.
If your user thinks the authentication mechanism is clumsy, takes too long or involves them having to do more than type a six-letter password that they don’t have to change more than once a month, they complain. Even worse, they look for ways to get around it. This is why, for example, the use of multifactor authentication solutions has not been as rapid as most of us would have liked.
To tackle this problem over the years IT vendors have looked at many different approaches to make signing into systems more secure without raising the hackles of your user community.
Biometrics have been around for some time and, to be fair, the take up of fingerprint authentication has been growing quite quickly in the consumer space, but for a number of reasons it hasn’t really set the business world on fire. So what other options are there?
Well a few vendors have started to look at the problem a little differently, using identity verification techniques based on looking at user behaviour. An approach that has been developing rapidly in recent years is based on capturing a pattern of how users, or indeed customers, interact with the devices they use. This could include the way they type, the speed they type at, words they typically mistype, how they navigate their desktop, which shortcuts they employ, and so on. The idea is that if an imposter gets past the traditional login process (e.g. with stolen credentials), a pattern mismatch will be detected extremely quickly and appropriate action taken – lock out, admin alerts, etc.
A company I recently met with, BehavioSec, has extended this approach to work not just on traditional PCs with keyboards, but to also to take in how a user works on tablets and smartphones where touch technologies are in play. It claims that its solutions have now matured to the degree where you can achieve very, very high rates of authentication accuracy, with remarkably low ‘false-negatives’. More importantly, the users are unaware of the added security being employed when they work normally, thus overcoming the user resistance challenge.
BehavioSec tells me that it typically requires monitoring 6 to 10 sessions of a user working with an application to get a good pattern match. This is clearly a non-trivial requirement compared to the traditional creation of an account and password, but the benefits thereafter, in terms of both enhanced security and user satisfaction, could well be valuable enough to justify the up-front time and effort.
The password isn’t dead yet, alas, but it’s encouraging to see new approaches and solutions emerging to help you strike the right balance between security and usability.
Tony is an IT operations guru. As an ex-IT manager with an insatiable thirst for knowledge, his extensive vendor briefing agenda makes him one of the most well informed analysts in the industry, particularly on the diversity of solutions and approaches available to tackle key operational requirements. If you are a vendor talking about a new offering, be very careful about describing it to Tony as ‘unique’, because if it isn’t, he’ll probably know.
Have You Read This?
Generative AI Checkpoint
From Barcode Scanning to Smart Data Capture
Beyond the Barcode: Smart Data Capture
The Evolving Role of Converged Infrastructure in Modern IT
Evaluating the Potential of Hyper-Converged Storage
Kubernetes as an enterprise multi-cloud enabler
A CX perspective on the Contact Centre
Automation of SAP Master Data Management