Future of Authentication

Security & Usability for the Digital Transformation

To achieve transformative business objectives, stay competitive and meet user expectations, enterprises are undergoing a digital transformation, also known as Passwordless modernization along with Cisco Enterprises are migrating from legacy systems to the cloud, resulting in hybrid environments. Consumer markets are driving the push toward usable, mobile technology and always-on, always-available cloud, web-based applications. This forward  to the cloud includes both customers and all types of enterprise users – including employees, contractors, vendors, partners, etc. In addition to password lockouts, the sheer number of cloud services and passwords that a user required to log into to do their job has increased over the years. Now, the average enterprise uses 1,400 different cloud services, while the average business user must log in with as many as 190 passwords, according to SkyHigh Networks and Security Magazine.

This shift to a decentralized, identity-centric and Passwordless

Operational model has placed increased importance on ensuring secure access for users. Passwordless: The Future of Authentication demands both a secure and usable method of authorizing users to both cloud and on-premises systems. The origin of the password arrived in the mid-1960s at the Massachusetts Institute of Technology MIT with the development of the Compatible Time-Sharing System (CTSS), according to Computer History and Wired. It allowed hundreds of users to share the computer with a common mainframe. The “password” was developed as an accounting tool to allow users access to their specific resources for a certain amount of time.

A Nascent Market

Today, many passwordless vendors only solve for one use case or enable a passwordlite experience for users through single sign-on (SSO), changing the order of factors and session management. However, these piecemeal approaches can leave security gaps while not fully solving for the weakness of passwords. For example, will the passwordless solution cover every authentication flow, and even if it does, will it assess the posture of devices accessing without a password?

Modern enterprises cannot cover all of their access use cases today with a single passwordless solution.

To read full download the whitepaper:

Passwordless: The Future of Authentication

Leave a Reply

Your email address will not be published. Required fields are marked *