Leave legacy authentication behind and rebuild trust

November 1 webinar to explore a new model for digital identities.

By David Duncan, VP, Product & Solutions Marketing, Security, CA Technologies

Identities under attack

Security breaches at some of the world’s biggest companies made headlines this year, pushing smart business owners in industries across all sectors to question whether legacy authentication techniques, like usernames and passwords, and storing significant amounts of user privacy data are putting all of them, and us, at significant risk.

For decades, usernames and passwords have been the default method for securing personal information on the web. The approach has been modified over the years— mandating stronger passwords and more frequent password changes—but the underlying approach hasn’t evolved to much more than adding multi factor authentication. You still have to remember your user name and password, and you now need a secondary device accessible for confirmation (like your mobile phone).

Each website that we interact with requires its own unique identification scheme as dictated by that business. As a result, users are left with an untenable situation of having to remember or write down tens or hundreds of logins with different parties and websites they interact with in the digital world – or use the same credentials over and over again which increases the risk of wider spread damage if that password is compromised.   And with each 30 or 90 day period comes another request to change passwords.

Look in the mirror and ask yourself, “can I possibly remember all of the passwords that I have?” And with the recent breaches of commercial password vaulting solutions like LastPass, whom can you trust to store your core online credentials? Should user names and passwords go the way of the Dodo bird?

Join us to learn more about a new model of online trust

Please join me for a webinar on November 1 at 1:00 p.m MST where we will talk about a new model of online trust for Identity and Access Management that leverages the hidden markers of your digital DNA to provide attestation and corroboration that you are the authorized party across all of your digital interactions. And how this type of solution can not only improve identity corroboration and reduce fraud, but also help businesses reduce their identity attack surface. We’ll also discuss recent survey results from cyber security professionals about their opinions about the importance of moving away from user names and passwords and how they view the state of online trust.

 

 


CA Community is the blog manager’s account used to post general updates and news items.

Comments

rewrite

Insights from the app driven world
Subscribe Now >
RECOMMENDED
The Sociology of Software >How (Not) to Lie with Data Visualization >DevOps and Cloud Computing: Exploiting the Synergy for Business Advantage >