Alternative to tokens for strong authentication
The recent news about the breach at a major token based authentication provider has raised concerns with many about the security of their data and how it may have placed their current customer base at risk. Secure two factor authentication has been a standard for strong authentication which creates secure remote access. Tokens have been a big part of that. On the other hand, there are alternatives to token based two-factor authentication that are not affected by this breach. A platform that is configurable at a policy level to turn on and turn off different forms of authentication (tokens, SMS to phones, voice biometrics etc.) provides the ability to weather the breach of one channel.
We acknowledge that this is a very serious situation for all companies providing security solutions, and particularly authentication solutions, to the marketplace. Enterprise businesses have trusted Equifax for over 100 years to protect valuable assets ranging from personally identifiable information (PII) to delivering innovative solutions in fraud detection, decisioning technology, and much more. Equifax has a history of employing best practices for securing data and manage identity, and we continue to review and improve those practices.
Equifax’s Anakam identity and multi-factor authentication solutions were created with federal mandates and NIST guidelines as the guidepost against which we measured our capabilities. We continue to build solutions based on these guidelines and best practices. We provide a single platform that supports multiple authentication capabilities with a configurable framework. This helps business continuity for our customers when faced with these types of situations. We are providing these solutions and professional services to our customers in Government, Healthcare, Financial Services, Telco, Utilities, and other industries. Please contact us here to understand more about the tokenless alternatives for strong authentication.
Recommended For You
Approximately $12 billion has been stolen by identity thieves over the past six years[i], and consumers are increasingly aware of […]
A Two-step Authentication Approach Consumers are always on the go, using digital devices to make purchases, check account balances and […]
On February 9, 2016, the President implemented the Cybersecurity National Action Plan (CNAP) designed “to enhance cybersecurity awareness and protections, protect […]
Protecting protected health information (PHI) requires vigilance in today’s environment of increased sharing of personal information online. National HealthIT Week […]