Mobile multi-factor authentication software and service: technologies, trends, stakes, vendors,


biometric scanning

When it comes to authenticate user identity, it is henceforth clear that, Username and Passwords have fail to provide adequate authentication and that, authentication-based attacks continue to juggle organizations of all sizes with the majority of breaches being attributed to weak or absent authentication.

Connectikpeople.co observes that, this reality has created significant market demand for mobile user authentication technologies that can be used to provide additional factor of authentication.

A set of growing enterprises and organizations including Google, Facebook, Microsoft, Twitter, and Apple are already using two-factor authentication (2FA).

According to ABI Research One-time-passwords (OTPs) and tokens have emerged as the preferred choice of authentication as they offer greater security because the password they generate is only valid for a single session/transaction.

Digital certificates based on the concept of public/private key cryptography are also an effective authentication mechanism. 

Public key techniques have been adopted in many areas of information technology, including network security, operating systems security, application data security, and digital rights management (DRM). 

Connectikpeople.co recalls that, a comprehensive solution will allow organizations to effectively enforce the appropriate method of authentication across applications, endpoints, and environments (on-premise and cloud) without burdening end users.


 “In the recent years hard tokens have been increasingly replaced by their software counterparts (soft tokens) which use either a smartphone app or the phone itself to supply a secret code for authentication. Other methods used to provide the second authentication factor include smart cards, security certificates, OTPs, and biometric scanning. Says Monolina Sen, ABI Research’s Senior Analyst in Digital Security.


Key vendors include:  MobileIron, Gemalto, Centrify, Entrust, SecureAuth, Sansa Security, CA Technologies, SecurEnvoy, HID Global, and Symantec.

Popular Posts