Slide background

The Entersekt blog.

Industry news, security threats, and technology advances in consumer authentication
The (lock and) key to strong security

The (lock and) key to strong security


Let me begin with a short story, a true story. A good friend of mine’s house was recently broken into. He was asleep in bed when this event took place, and he heard nothing. In fact, when he got up in the morning, he didn’t even notice at first that the event had taken place, such was the subtlety of the break-in. The thief had managed to break a door lock, opening the door without making much sound at all. The technique was to snap off the front of the lock and use a screwdriver to open the door: very quiet and very quick. 

Read More ...

Snippet: At the start of a new year, many of us take the opportunity to reflect on the past 12 months and to look forward to the year that lies ahead.

At the start of a new year, many of us take the opportunity to reflect on the past 12 months and to look forward to the year that lies ahead.

Snippet: At Entersekt, we get to know our customers pretty well, as you’ll imagine. Some take our product and integrate it within two months, then leave it unchanged. No mess, no fuss. My favorite customers, however, are those that continue to extract value from what we’ve provided them.

At Entersekt, we get to know our customers pretty well, as you’ll imagine. Some take our product and integrate it within two months, then leave it unchanged. No mess, no fuss. My favorite customers, however, are those that continue to extract value from what we’ve provided them.

Snippet: Like Entersekt, banks are purveyors of trust. A lack of trust is a serious opportunity cost that can threaten an institution’s future by, among other things, retarding innovation in online and mobile banking functionality and usability. How does a bank protect and nurture the trust relationship?

Like Entersekt, banks are purveyors of trust. A lack of trust is a serious opportunity cost that can threaten an institution’s future by, among other things, retarding innovation in online and mobile banking functionality and usability. How does a bank protect and nurture the trust relationship?

Snippet: A mobile transaction authentication number (mTAN) is a one-time password delivered to users of online systems using the SMS format. Millions of digital banking customers use them today to verify their online transactions with their bank.

A mobile transaction authentication number (mTAN) is a one-time password delivered to users of online systems using the SMS format. Millions of digital banking customers use them today to verify their online transactions with their bank.

Snippet: Necessity is the mother of invention. For a fresh-faced bunch of geeks taking on established heavyweights, Entersekt has been very careful to lodge patent applications to protect its intellectual property. Our approach to digital user and transaction authentication is, after all, unlike any other on the market.

Necessity is the mother of invention. For a fresh-faced bunch of geeks taking on established heavyweights, Entersekt has been very careful to lodge patent applications to protect its intellectual property. Our approach to digital user and transaction authentication is, after all, unlike any other on the market.

Snippet: In its Global Innovation Index 2015 report, INSEAD makes the point that, “While gaps remain in overall innovation performance between rich and poor countries, the technology gap is narrowing.

In its Global Innovation Index 2015 report, INSEAD makes the point that, “While gaps remain in overall innovation performance between rich and poor countries, the technology gap is narrowing.

Snippet: Two-factor authentication is, by now, a familiar means of securing online systems, especially in the financial services industry. Apart from static credentials (username and password), a user is usually also asked to authorize the transaction, or even a login event, by using another method.

Two-factor authentication is, by now, a familiar means of securing online systems, especially in the financial services industry. Apart from static credentials (username and password), a user is usually also asked to authorize the transaction, or even a login event, by using another method.

Snippet: Mobile commerce transactions and other app-based payments must be secured if consumer adoption is to continue at the impressive pace we have seen. Attacks on customer accounts by fraudsters are becoming increasingly sophisticated, which raises concerns among consumers about the safety of mobile transactions.

Mobile commerce transactions and other app-based payments must be secured if consumer adoption is to continue at the impressive pace we have seen. Attacks on customer accounts by fraudsters are becoming increasingly sophisticated, which raises concerns among consumers about the safety of mobile transactions.

Snippet: In April, Five years, two months, and nine days. That's how long it's been since the release of Android 2.2 (May 20, 2010). It's also how long a bug has existed on the Google Android mobile operating system that allows remote code execution.

In April, Five years, two months, and nine days. That's how long it's been since the release of Android 2.2 (May 20, 2010). It's also how long a bug has existed on the Google Android mobile operating system that allows remote code execution.

Snippet: Apple’s TouchID has taken the world by storm and, with official fingerprint biometric support now also coming to Android M, it looks like username and password prompts on mobile applications will soon go the way of the VCR and the gramophone player.

Apple’s TouchID has taken the world by storm and, with official fingerprint biometric support now also coming to Android M, it looks like username and password prompts on mobile applications will soon go the way of the VCR and the gramophone player.

Entersekt Logo

Entersekt is an innovator of customer-centric fintech solutions. Financial services providers and other enterprises rely on our patented mobile identity system to provide both security and the best in convenient new digital experiences to their customers, irrespective of the service channel. With us, they can concentrate on their innovation roadmap, while delivering intuitive, low-friction digital experiences to their customers.