Slide background

The Entersekt blog.

Industry news, security threats, and technology advances in consumer authentication
Passwordless authentication: The future is here

Passwordless authentication: The future is here


Passwords suck! There, I said it. We've all heard it said many times before, but it’s worth repeating. The concept of gate-keeping access to digital services with a username and password may have been appropriate, and even good practice, in the early days of computing when a person might only have one or two logins to maintain. However, in today’s world where people have hundreds of accounts, they tend to re-use one password for multiple accounts or outsource the job to a password manager service. And even if you do manage to create a complex and unique password for each account, and remember it at the time of login, there is still the problem of data breaches, which are becoming all too common. 

Read More ...

Snippet: Like Entersekt, banks are purveyors of trust. A lack of trust is a serious opportunity cost that can threaten an institution’s future by, among other things, retarding innovation in online and mobile banking functionality and usability. How does a bank protect and nurture the trust relationship?

Like Entersekt, banks are purveyors of trust. A lack of trust is a serious opportunity cost that can threaten an institution’s future by, among other things, retarding innovation in online and mobile banking functionality and usability. How does a bank protect and nurture the trust relationship?

Snippet: A mobile transaction authentication number (mTAN) is a one-time password delivered to users of online systems using the SMS format. Millions of digital banking customers use them today to verify their online transactions with their bank.

A mobile transaction authentication number (mTAN) is a one-time password delivered to users of online systems using the SMS format. Millions of digital banking customers use them today to verify their online transactions with their bank.

Snippet: Necessity is the mother of invention. For a fresh-faced bunch of geeks taking on established heavyweights, Entersekt has been very careful to lodge patent applications to protect its intellectual property. Our approach to digital user and transaction authentication is, after all, unlike any other on the market.

Necessity is the mother of invention. For a fresh-faced bunch of geeks taking on established heavyweights, Entersekt has been very careful to lodge patent applications to protect its intellectual property. Our approach to digital user and transaction authentication is, after all, unlike any other on the market.

Snippet: In its Global Innovation Index 2015 report, INSEAD makes the point that, “While gaps remain in overall innovation performance between rich and poor countries, the technology gap is narrowing.

In its Global Innovation Index 2015 report, INSEAD makes the point that, “While gaps remain in overall innovation performance between rich and poor countries, the technology gap is narrowing.

Snippet: Two-factor authentication is, by now, a familiar means of securing online systems, especially in the financial services industry. Apart from static credentials (username and password), a user is usually also asked to authorize the transaction, or even a login event, by using another method.

Two-factor authentication is, by now, a familiar means of securing online systems, especially in the financial services industry. Apart from static credentials (username and password), a user is usually also asked to authorize the transaction, or even a login event, by using another method.

Snippet: Mobile commerce transactions and other app-based payments must be secured if consumer adoption is to continue at the impressive pace we have seen. Attacks on customer accounts by fraudsters are becoming increasingly sophisticated, which raises concerns among consumers about the safety of mobile transactions.

Mobile commerce transactions and other app-based payments must be secured if consumer adoption is to continue at the impressive pace we have seen. Attacks on customer accounts by fraudsters are becoming increasingly sophisticated, which raises concerns among consumers about the safety of mobile transactions.

Snippet: In April, Five years, two months, and nine days. That's how long it's been since the release of Android 2.2 (May 20, 2010). It's also how long a bug has existed on the Google Android mobile operating system that allows remote code execution.

In April, Five years, two months, and nine days. That's how long it's been since the release of Android 2.2 (May 20, 2010). It's also how long a bug has existed on the Google Android mobile operating system that allows remote code execution.

Snippet: Apple’s TouchID has taken the world by storm and, with official fingerprint biometric support now also coming to Android M, it looks like username and password prompts on mobile applications will soon go the way of the VCR and the gramophone player.

Apple’s TouchID has taken the world by storm and, with official fingerprint biometric support now also coming to Android M, it looks like username and password prompts on mobile applications will soon go the way of the VCR and the gramophone player.

Snippet: The password paradigm is widely acknowledged to be obsolete, but to usher in something new requires an industry-wide effort. To help manage this issue, some of information technology’s biggest players formed the FIDO (Fast IDentity Online) Alliance, which is now revolutionizing online authentication with its standards-based open protocols aimed at reducing our reliance on vulnerable password-based security systems.

The password paradigm is widely acknowledged to be obsolete, but to usher in something new requires an industry-wide effort. To help manage this issue, some of information technology’s biggest players formed the FIDO (Fast IDentity Online) Alliance, which is now revolutionizing online authentication with its standards-based open protocols aimed at reducing our reliance on vulnerable password-based security systems.

Snippet: LastPass announced June 15 that it had detected and subsequently blocked “suspicious activity” on its networks a couple of days before. The attackers made off with email addresses associated with LastPass accounts, hints that help users reset their master passwords, salted password hashes, as well as the associated salts.

LastPass announced June 15 that it had detected and subsequently blocked “suspicious activity” on its networks a couple of days before. The attackers made off with email addresses associated with LastPass accounts, hints that help users reset their master passwords, salted password hashes, as well as the associated salts.

Entersekt Logo

Entersekt is an innovator of customer-centric fintech solutions. Financial services providers and other enterprises rely on our patented mobile identity system to provide both security and the best in convenient new digital experiences to their customers, irrespective of the service channel. With us, they can concentrate on their innovation roadmap, while delivering intuitive, low-friction digital experiences to their customers.