SlideShare a Scribd company logo
WEBINAR
AUTHENTIFUSION
CLARIFYING THE FUTURE OF USER AUTHENTICATION
MARCH 2016
MICHAEL THELANDER
Product Marketing Manager, Authentication
2
Understand Advanced Authentication as a multilayered approach
Understand the critical relationship between Advanced Authentication and Risk
Understand the role of device recognition in a “passwordless” future
Provide a three-step plan to evaluate device-based authentication for your customers
3
4
5
PASSWORDS HAVE BEEN WITH US A LONG TIME
PA S S W O R D S I N R O M A N G A R R I S O N S
1
2
3
4
5
6
7
81
0
9
6
PASSWORDS HAVE BEEN WITH US A LONG TIME
PA S S W O R D S I N H A M L E T
7
PASSWORDS HAVE BEEN WITH US A LONG TIME
PA S S W O R D S I N D - D AY, 1 9 4 4
8
The credential market is huge
TARGE
T70M SONY
10M
EBAY
145M ADOBE
152M
HOME
DEPOT
56M
2014: 675 MILLION
RECORDS EXPOSED
IDENTITY THEFT RESOURCE CENTER
9
2015 adds to 2014’s record
OPM
22M
ANTHEM
80M
Experian
/ T-Mobile
15M
2015: 169 MILLION
MORE RECORDS EXPOSED
IDENTITY THEFT RESOURCE CENTER
11M
PREMERA
PATREON
Unknown
(15GB of passwords)
10
2015 adds to the record
exposures from 2014
FROM ONE SELLER
*
NOW 1.2 BILLION CREDENTIALS
AVAILABLE ON BLACK MARKET
*An active FBI investigation as reported by SC Magazine, November 2015
11
Protected by only
6 passwords.
1 2
3 4
5 6
PASSWORDS ARE INCREASINGLY UNRELIABLE
Consumers have an average of
24 online accounts.
1 2 3 4 5 6
7 8 9 10 11 12
13 14 15 16 17 18
19 20 21 22 23 24
21GRBlue1421GRGreen1
4
21BlackGR1414PurpleGR2
1
12
“In an era in which passwords are generally considered
inadequate, at best, it’s easy to understand why many
organizations are turning to advanced
authentication”
-PwC’s Global State of Information Security 2016
13
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
Operating System Hash of fonts
IP Address Flash execution
Browser version Plugin inventory
Language Flash 4-part vers.
Screen
Resolution
Hundreds of attributes
14
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
15
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
Biometric / Behavior
 Fingerprint scans
 Retinal, facial
scans
 Voice analysis
 Brain/heart signals
 Behavior patterns
16
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
Biometric / Behavior
 Fingerprint scans
 Retinal, facial
scans
 Voice analysis
 Brain/heart signals
 Behavior patterns
Knowledge
 Secret questions
 Captcha
 Passwords
 Pattern Matching
 Local knowledge
 Web pictographic
17
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
 Context
 User’s goal & request
 Data sensitivity
 Geo location
Risk-Aware
 IP Address (real and implied)
 Device reputation
 Privileged access
 Vector (TOR browsers, anonymizers)
18
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … . W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
Biometric /
Behavior
 Fingerprint scans
 Retinal, facial
scans
 Voice analysis
 Brain/heart signals
 Behavior patterns
Knowledge
 Secret questions
 Captcha
 User details
 Pattern Matching
 Local knowledge
 Web pictographic
 User’s goal & request
 Data sensitivity
 Geo location
 IP Address (real and
implied)
Risk-Aware
 Device reputation
 Privileged access
 Language
 Patterns of usage
19
“Consumers will adopt solutions that ease the burden of
remembering passwords or carrying tokens.
Authentication must be frictionless
and easy to use.”
Suzanne Hall, Managing Director, from PwC’s
Global State of Information Security 2016
20
1
Use device
recognition to
augment passwords
and reduce friction
Device-based
authentication with
context-aware risk
assessment
becomes the norm
3
Limit the use of
passwords to high-risk
transactions and
requests only
2
iovation’s milestones on the road to passwordless
IMPROVEMENT AVOIDANCE REPLACEMEN
T
21
Something you
KNOW
Something you
HAVE
Something you
ARE
ADVANCED AUTHENTICATION REQUIRES 2 FACTORS
W H Y “ D E V I C E I D ” I S T H E F O U N D AT I O N O F A PA S S W O R D L E S S F U T U R E
22
ADVANCE AUTHENTICATION INCLUDES RISK
CONTEXT
W H E R E D O W E E X P E R I E N C E T H E G R E AT E S T R I S K ?
WEBSITE
23
RISK IN CONTEXT
W I T H D I F F E R E N T A U T H E N T I C AT I O N M E T H O D S
24
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
25
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
+10
SCORE
LOW RISK = Frictionless
Consumer Experience
SHOPPING
RESOURCES
NEWS
+10
SCORE
26
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
0
SCORE
MEDIUM RISK= Moderate
Friction
USERNAME &
PASSWORD
27
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
-10
SCORE
HIGH RISK=
Step-Up Authentication
FRAUD TEAM
28
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
+10
SCORE
0
SCORE
-10
SCORE
LOW RISK = Frictionless
Consumer Experience
MEDIUM RISK= Moderate
Friction
HIGH RISK=
Step-Up Authentication
CREDENTIAL
INPUT
CREDENTIAL
INPUT
SHOPPING
RESOURCES
NEWS
USERNAME &
PASSWORD
CREDENTIAL
INPUT
29
DEVICE CHANGE TOLERANCE
W H AT A B O U T N AT U R A L D AY- T O - D AY C H A N G E S ?
FONTSBROWSERLOCATION
EXPECTED
NOT EXPECTED
UPDATED
BROWSER
-12BROWSER
REGRESSION
+1LIMITED
TRAVEL
MULTIPLE TIME
ZONES IN 1 HOUR
Aa
30
PRECISE MATCH FUZZY MATCH
ELASTIC DEVICE MATCHING
Device Type: MACBOOK PRO Device Type: MACBOOK PRO
MINIMUM
THRESHOLD
MAXIMUM
THRESHOLD
Operating System OS X Yosemite
IP Address 22.231.113.64
Browser Safari 8.0.2
Language English
Screen Resolution 2880 x 1800
Operating System OS X Yosemite or
later
IP Address Similar Location
Browser Safari 8.0.2 or later
Language English
Screen Resolution 2880 x 1800
31
HISTORICAL
REPUTATION
SECURITY RISK
INDICATORS
LINKS AND
ASSOCIATIONS
ANOMALOUS
BEHAVIOR
AUTHORIZED
FOR ACCOUNT
32
33
HISTORICAL
REPUTATION
SECURITY RISK
INDICATORS
LINKS AND
ASSOCIATIONS
ANOMALOUS
BEHAVIOR
AUTHORIZED
FOR ACCOUNT
34
35
1. For brand managers, product owners, or web experience
managers, understand where the greatest risk is in your site
2. Understand what benefits would be realized if your customers
experienced less friction
3. Assess the impact of a device-based alternative to your
current methods of authentication
A Three-step Plan to evaluate iovation’s
Customer Authentication for your sites
36
iovation’s
Customer Authentication service wins
“Best Multi-factor Authentication Solution”
in Cyber Defense Magazine’s
2016 Editor’s Choice Awards
CONTACT US
www.iovation.com
twitter.com/iovation
Product Marketing Manager, Authentication
Michael Thelander
michael.thelander@iovation.co
m
+1 503-224-6010

More Related Content

PPTX
Reduce Friction and Risk with Device Authentication
PPTX
Authentifusion: Clarifying the Future of User Authentication
PDF
The Consumerization of Authentication with iovation
PPTX
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
PDF
SmartGo
PPTX
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
PPT
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
PDF
Mobile Solutions and Market Trends
Reduce Friction and Risk with Device Authentication
Authentifusion: Clarifying the Future of User Authentication
The Consumerization of Authentication with iovation
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
SmartGo
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Mobile Solutions and Market Trends

What's hot (20)

PPTX
Lunch and Learn: Fraud Trends in Financial Services
PPT
Mobile Payment fraud & risk assessment
PPT
Overview of Mobile Payment Systems
PPTX
Secure mobile payment
PPTX
October 2015 Vasco investor presention
PDF
September 2015 vasco investor presention final
PDF
ISACA Mobile Payments Forum presentation
PDF
Introduction to Solus
PDF
Woral Seminar port
PDF
Going beyond MFA(Multi-factor authentication)-Future demands much more
PPTX
Aman PPT
PPTX
Identity Access Management 101
PDF
Pay-Cloak:Biometric
PDF
Usher overview.2014.02 hi
PPTX
What Are Sound Based Payments
PDF
Monster Group Product Catalogue | 2020
PDF
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
PDF
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
PPTX
Wiseasy Profile
PDF
How to successfully implement a secure mobile strategy
Lunch and Learn: Fraud Trends in Financial Services
Mobile Payment fraud & risk assessment
Overview of Mobile Payment Systems
Secure mobile payment
October 2015 Vasco investor presention
September 2015 vasco investor presention final
ISACA Mobile Payments Forum presentation
Introduction to Solus
Woral Seminar port
Going beyond MFA(Multi-factor authentication)-Future demands much more
Aman PPT
Identity Access Management 101
Pay-Cloak:Biometric
Usher overview.2014.02 hi
What Are Sound Based Payments
Monster Group Product Catalogue | 2020
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Wiseasy Profile
How to successfully implement a secure mobile strategy
Ad

Viewers also liked (18)

PPTX
El maquillaje organico 1
PDF
PPTX
Oct 25 CAPHC Breakfast Symposium - Sponsored by the Nursing Network
PDF
Modélisation algorithmique d'un troupeau de moutons
PDF
أثر النمو السكاني على بعض قطاعات التنمية في محافظة معان
PDF
El centro como lugar de aprendizaje
PDF
Management (nouvelle mise à jour 26/09))
PPTX
Kb 2 resusitasi pada dewasa
PPTX
Isu etik bidan dengan tenaga kesehatan lain kelompok 4
PDF
économie générale SEG (Amine nasrallah Ecoaf)
PPT
Rules on Clear and Effective Writing
DOCX
Makalah etika dan hukum kesehatan
PDF
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
PPTX
Model dan konsep teori keperawatan 1
PDF
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
PPT
Chapter 14 - Protection
PDF
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
PPTX
Security & protection in operating system
El maquillaje organico 1
Oct 25 CAPHC Breakfast Symposium - Sponsored by the Nursing Network
Modélisation algorithmique d'un troupeau de moutons
أثر النمو السكاني على بعض قطاعات التنمية في محافظة معان
El centro como lugar de aprendizaje
Management (nouvelle mise à jour 26/09))
Kb 2 resusitasi pada dewasa
Isu etik bidan dengan tenaga kesehatan lain kelompok 4
économie générale SEG (Amine nasrallah Ecoaf)
Rules on Clear and Effective Writing
Makalah etika dan hukum kesehatan
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
Model dan konsep teori keperawatan 1
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
Chapter 14 - Protection
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
Security & protection in operating system
Ad

Similar to Authentifusion: Clarifying the Future of User Authentication (20)

PPTX
Authentifusion: Clarifying the Future of Customer Authentication
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPTX
How to Stop Cyber Attacks Using Adaptive Authentication
PPTX
BehavioSec Web Summit START slideshare
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PPTX
Lunch and Learn: Recognising the Good Guys
PPTX
iovation's Dynamic Authentication Suite
PPTX
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
PDF
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
PPTX
Intelligent authentication Identity tech talks
PDF
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
PDF
CIS14: Persistent Trusted Identity
PDF
Identity Live Sydney: Intelligent Authentication
PPTX
Dynamic authentication rollin'
PDF
Creating a Winning Experience While Battling Online Fraud
PPTX
Global Regulatory Landscape for Strong Authentication
PPTX
Financial services 20150503
PPTX
Age Verification: Reaching a Tipping Point
Authentifusion: Clarifying the Future of Customer Authentication
#MFSummit2016 Secure: Mind the gap strengthening the information security model
How to Stop Cyber Attacks Using Adaptive Authentication
BehavioSec Web Summit START slideshare
Intelligent Authentication (Identity Live Berlin 2018)
Lunch and Learn: Recognising the Good Guys
iovation's Dynamic Authentication Suite
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Stronger/Multi-factor Authentication for Enterprise Applications
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Intelligent authentication Identity tech talks
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
CIS14: Persistent Trusted Identity
Identity Live Sydney: Intelligent Authentication
Dynamic authentication rollin'
Creating a Winning Experience While Battling Online Fraud
Global Regulatory Landscape for Strong Authentication
Financial services 20150503
Age Verification: Reaching a Tipping Point

More from TransUnion (20)

PPTX
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
PPTX
A New Imperative: Global Privacy and Data Strategies
PPTX
The Business Imperative for Identity, Trust and Data Stewardship
PPTX
2020 i gaming report webinar
PPTX
Financial services report webinar v4
PPTX
Webinar: Roll Out the VIP Path to Play
PPT
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PPT
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
PPTX
How Confused.com and iovation Fight Ghost Broking
PPTX
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
PDF
The Insurance Digital Revolution Has a Fraud Problem
PPTX
PSD2: The Advent of the New Payments Market in Europe
PPTX
How E-Commerce Providers Can Remove ATO from Their Carts
PPTX
2019 iovation Gambling Industry Report Highlights
PPTX
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
PPTX
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
PPTX
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
PPTX
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
PPTX
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
PDF
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
A New Imperative: Global Privacy and Data Strategies
The Business Imperative for Identity, Trust and Data Stewardship
2020 i gaming report webinar
Financial services report webinar v4
Webinar: Roll Out the VIP Path to Play
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
How Confused.com and iovation Fight Ghost Broking
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
The Insurance Digital Revolution Has a Fraud Problem
PSD2: The Advent of the New Payments Market in Europe
How E-Commerce Providers Can Remove ATO from Their Carts
2019 iovation Gambling Industry Report Highlights
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
4 GDPR Hacks to Mitigate Breach Risks Post GDPR

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
ai tools demonstartion for schools and inter college
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Transform Your Business with a Software ERP System
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
medical staffing services at VALiNTRY
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPT
Introduction Database Management System for Course Database
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
System and Network Administration Chapter 2
CHAPTER 2 - PM Management and IT Context
Wondershare Filmora 15 Crack With Activation Key [2025
ai tools demonstartion for schools and inter college
How to Choose the Right IT Partner for Your Business in Malaysia
Transform Your Business with a Software ERP System
Designing Intelligence for the Shop Floor.pdf
L1 - Introduction to python Backend.pptx
Operating system designcfffgfgggggggvggggggggg
Softaken Excel to vCard Converter Software.pdf
Digital Strategies for Manufacturing Companies
Adobe Illustrator 28.6 Crack My Vision of Vector Design
medical staffing services at VALiNTRY
Navsoft: AI-Powered Business Solutions & Custom Software Development
Design an Analysis of Algorithms I-SECS-1021-03
Introduction Database Management System for Course Database
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf

Authentifusion: Clarifying the Future of User Authentication

  • 1. WEBINAR AUTHENTIFUSION CLARIFYING THE FUTURE OF USER AUTHENTICATION MARCH 2016 MICHAEL THELANDER Product Marketing Manager, Authentication
  • 2. 2 Understand Advanced Authentication as a multilayered approach Understand the critical relationship between Advanced Authentication and Risk Understand the role of device recognition in a “passwordless” future Provide a three-step plan to evaluate device-based authentication for your customers
  • 3. 3
  • 4. 4
  • 5. 5 PASSWORDS HAVE BEEN WITH US A LONG TIME PA S S W O R D S I N R O M A N G A R R I S O N S 1 2 3 4 5 6 7 81 0 9
  • 6. 6 PASSWORDS HAVE BEEN WITH US A LONG TIME PA S S W O R D S I N H A M L E T
  • 7. 7 PASSWORDS HAVE BEEN WITH US A LONG TIME PA S S W O R D S I N D - D AY, 1 9 4 4
  • 8. 8 The credential market is huge TARGE T70M SONY 10M EBAY 145M ADOBE 152M HOME DEPOT 56M 2014: 675 MILLION RECORDS EXPOSED IDENTITY THEFT RESOURCE CENTER
  • 9. 9 2015 adds to 2014’s record OPM 22M ANTHEM 80M Experian / T-Mobile 15M 2015: 169 MILLION MORE RECORDS EXPOSED IDENTITY THEFT RESOURCE CENTER 11M PREMERA PATREON Unknown (15GB of passwords)
  • 10. 10 2015 adds to the record exposures from 2014 FROM ONE SELLER * NOW 1.2 BILLION CREDENTIALS AVAILABLE ON BLACK MARKET *An active FBI investigation as reported by SC Magazine, November 2015
  • 11. 11 Protected by only 6 passwords. 1 2 3 4 5 6 PASSWORDS ARE INCREASINGLY UNRELIABLE Consumers have an average of 24 online accounts. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 21GRBlue1421GRGreen1 4 21BlackGR1414PurpleGR2 1
  • 12. 12 “In an era in which passwords are generally considered inadequate, at best, it’s easy to understand why many organizations are turning to advanced authentication” -PwC’s Global State of Information Security 2016
  • 13. 13 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) Operating System Hash of fonts IP Address Flash execution Browser version Plugin inventory Language Flash 4-part vers. Screen Resolution Hundreds of attributes
  • 14. 14 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards
  • 15. 15 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards Biometric / Behavior  Fingerprint scans  Retinal, facial scans  Voice analysis  Brain/heart signals  Behavior patterns
  • 16. 16 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards Biometric / Behavior  Fingerprint scans  Retinal, facial scans  Voice analysis  Brain/heart signals  Behavior patterns Knowledge  Secret questions  Captcha  Passwords  Pattern Matching  Local knowledge  Web pictographic
  • 17. 17 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N  Context  User’s goal & request  Data sensitivity  Geo location Risk-Aware  IP Address (real and implied)  Device reputation  Privileged access  Vector (TOR browsers, anonymizers)
  • 18. 18 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … . W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards Biometric / Behavior  Fingerprint scans  Retinal, facial scans  Voice analysis  Brain/heart signals  Behavior patterns Knowledge  Secret questions  Captcha  User details  Pattern Matching  Local knowledge  Web pictographic  User’s goal & request  Data sensitivity  Geo location  IP Address (real and implied) Risk-Aware  Device reputation  Privileged access  Language  Patterns of usage
  • 19. 19 “Consumers will adopt solutions that ease the burden of remembering passwords or carrying tokens. Authentication must be frictionless and easy to use.” Suzanne Hall, Managing Director, from PwC’s Global State of Information Security 2016
  • 20. 20 1 Use device recognition to augment passwords and reduce friction Device-based authentication with context-aware risk assessment becomes the norm 3 Limit the use of passwords to high-risk transactions and requests only 2 iovation’s milestones on the road to passwordless IMPROVEMENT AVOIDANCE REPLACEMEN T
  • 21. 21 Something you KNOW Something you HAVE Something you ARE ADVANCED AUTHENTICATION REQUIRES 2 FACTORS W H Y “ D E V I C E I D ” I S T H E F O U N D AT I O N O F A PA S S W O R D L E S S F U T U R E
  • 22. 22 ADVANCE AUTHENTICATION INCLUDES RISK CONTEXT W H E R E D O W E E X P E R I E N C E T H E G R E AT E S T R I S K ? WEBSITE
  • 23. 23 RISK IN CONTEXT W I T H D I F F E R E N T A U T H E N T I C AT I O N M E T H O D S
  • 24. 24 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS
  • 25. 25 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS +10 SCORE LOW RISK = Frictionless Consumer Experience SHOPPING RESOURCES NEWS +10 SCORE
  • 26. 26 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS 0 SCORE MEDIUM RISK= Moderate Friction USERNAME & PASSWORD
  • 27. 27 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS -10 SCORE HIGH RISK= Step-Up Authentication FRAUD TEAM
  • 28. 28 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS +10 SCORE 0 SCORE -10 SCORE LOW RISK = Frictionless Consumer Experience MEDIUM RISK= Moderate Friction HIGH RISK= Step-Up Authentication CREDENTIAL INPUT CREDENTIAL INPUT SHOPPING RESOURCES NEWS USERNAME & PASSWORD CREDENTIAL INPUT
  • 29. 29 DEVICE CHANGE TOLERANCE W H AT A B O U T N AT U R A L D AY- T O - D AY C H A N G E S ? FONTSBROWSERLOCATION EXPECTED NOT EXPECTED UPDATED BROWSER -12BROWSER REGRESSION +1LIMITED TRAVEL MULTIPLE TIME ZONES IN 1 HOUR Aa
  • 30. 30 PRECISE MATCH FUZZY MATCH ELASTIC DEVICE MATCHING Device Type: MACBOOK PRO Device Type: MACBOOK PRO MINIMUM THRESHOLD MAXIMUM THRESHOLD Operating System OS X Yosemite IP Address 22.231.113.64 Browser Safari 8.0.2 Language English Screen Resolution 2880 x 1800 Operating System OS X Yosemite or later IP Address Similar Location Browser Safari 8.0.2 or later Language English Screen Resolution 2880 x 1800
  • 32. 32
  • 34. 34
  • 35. 35 1. For brand managers, product owners, or web experience managers, understand where the greatest risk is in your site 2. Understand what benefits would be realized if your customers experienced less friction 3. Assess the impact of a device-based alternative to your current methods of authentication A Three-step Plan to evaluate iovation’s Customer Authentication for your sites
  • 36. 36 iovation’s Customer Authentication service wins “Best Multi-factor Authentication Solution” in Cyber Defense Magazine’s 2016 Editor’s Choice Awards
  • 37. CONTACT US www.iovation.com twitter.com/iovation Product Marketing Manager, Authentication Michael Thelander michael.thelander@iovation.co m +1 503-224-6010

Editor's Notes

  • #35: 24 online accounts protected by juts 6 passwords