• Latest

Why Move To Hosted Authentication?

11 March, 2011
China Liberal Education Holdings Limited Starts Higher Volume Production and Expands Domestic Sales Channels of All-in-one Machine AI-Space

China Liberal Education Holdings Limited Starts Higher Volume Production and Expands Domestic Sales Channels of All-in-one Machine AI-Space

19 December, 2020
Bell connecting Canadians at home for the holidays with free TV programming and no extra usage fees on residential Internet

Bell connecting Canadians at home for the holidays with free TV programming and no extra usage fees on residential Internet

18 December, 2020
TEMSA: Bus exports to be delivered to the heart of the European Union

TEMSA: Bus exports to be delivered to the heart of the European Union

18 December, 2020
EU tries to reshape the rules of the Internet

EU tries to reshape the rules of the Internet

17 December, 2020
Matterport Brings 3D Capture to the iPhone

Matterport Brings 3D Capture to the iPhone

5 May, 2020
NASA Administrator Statement on Agency Coronavirus Status

NASA Administrator Statement on Agency Coronavirus Status

15 March, 2020
Technology Supports Social Distancing in age of Covid-19

Technology Supports Social Distancing in age of Covid-19

15 March, 2020
Second Staff Exchange Between EU CyberSecurity Organizations

Second Staff Exchange Between EU CyberSecurity Organizations

19 February, 2020
Iranian Professor on the Iran-US escalation: “Iranians expected to hear a clear and steadfast condemnation from Turkish authorities over Soleimani’s death”

Iranian Professor on the Iran-US escalation: “Iranians expected to hear a clear and steadfast condemnation from Turkish authorities over Soleimani’s death”

16 February, 2020
Badly Trained Spam – Only A Quarter of Brits Train their Spam Filter

Badly Trained Spam – Only A Quarter of Brits Train their Spam Filter

6 February, 2020
Year 2020: What is the Status of 5G Rollout Worldwide and Turkey

Year 2020: What is the Status of 5G Rollout Worldwide and Turkey

31 January, 2020
Turkish Competition Authority’s Android Decision

Turkish Competition Authority’s Android Decision

18 December, 2019
  • About Us
  • Contact Us
  • Homepage
  • Latest News
  • News Widget
  • Privacy Policy
Wednesday, March 29, 2023
Social icon element need JNews Essential plugin to be activated.
  • Login
  • Register
Globaltelconews
Advertisement
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy
No Result
View All Result
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy
No Result
View All Result
Globaltelconews
No Result
View All Result

Why Move To Hosted Authentication?

globaltelconews-admin by globaltelconews-admin
11 March, 2011
in English
0

Intro
With an ever increasing number of users wanting to access an ever increasing number of company applications, from an ever increasing number of endpoints, secure access has become a critically important issue.

Couple that with a growth in pressure on companies to conform to standards such as those from the Payment Card Industry (PCI) and the Information Commissioners Office (ICO), then its not surprising that there has been a strong growth in 2-factor authentication, which involves a one-time password (OTP) on a hardware or software token, plus a PIN.

Another trend over the last couple of years has been towards hosted services, also known as cloud computing. According to The Information Security Breaches Survey 2010, over three quarters of the organisations polled used externally hosted solutions for some part of their business.

Put these two together, and its easy to see why hosted authentication or strong authentication as a service is growing in popularity.

Hosted authentication is a cloud-based service where two-factor, strong authentication is provided by an outside supplier instead of being done in-house. Gartner in the research paper On the Verge: Strong Authentication as a Service published June 2010, described the strong authentication as a service market as burgeoning.

Gary Marsden, vice president of managed services at CRYPTOCard, a leading provider of strong authentication solutions, predicted that hosted would generate half of the companys new sales by the end of the 2010. He commented: Two years ago lots of people were looking at [hosted 2FA] trials and it was mainly SMEs adopting. This year we have seen large enterprises take it seriously.

Why hosted authentication?
While recognising the need to improve their access security, some companies dont have the desire, or the expertise, or the extra finance necessary to implement and manage a two-factor authentication system themselves.

A hosted solution means there is no up front investment, no servers to buy, no extensive training, no network implementation or complicated integration and no heavy ongoing cost in managing the solution and associated infrastructure. In times of financial uncertainty, paying a fixed sum on a regular basis to a third party can be seen as an advantage.

Benefits of hosted authentication
* Instant and easier implementation
Hosted authentication takes all the complexity out of implementation and can be typically carried out in just a few hours, compared to several days for a traditional server based solution.

* Easier ongoing support
A high percentage of help desk calls are related to password and authentication problems. Hosted authentication provides for easier ongoing support, freeing helpdesk staff and system administrators to focus on other more urgent matters.

* No special skills
The adoption of in-house authentication may mean hiring qualified staff to install and manage the system, or training of existing staff, but hosted authentication is managed by experts, so no special skills are needed.

* Lower total cost of ownership
A combination of factors including not having to hire extra staff or train existing staff, instant and easier implementation, less help desk calls, less time spent on token logistics and less security incidents can result in a lower total cost of ownership for hosted authentication.

* Scalability
Hosted services are easily scalable to accommodate more users or more diverse access to networks.

How does it work?
How does a hosted authentication service work in practice and how does it provide the access security you need? As an example, we can look at what is provided by one of the market leaders CRYPTOCard.

The hosted service is accessible from anywhere via a standard web browser. When trying to connect to the corporate network over a VPN, for example, users are asked to identify themselves using their unique OTP and PIN. This request is then sent to the hosted service and the user is authorised and given access to the enterprise network.

The service provides the strongest two-factor authentication, and encryption algorithms as strong as AES 256. The OTP is as strong as eight character Base 64, the most secure type of password available.

A secure managed authentication portal lets users carry out all the administrative tasks associated with organising access and assigning tokens, without having to contact the supplier. Additionally, a service desk is available to give advice, answers, and assistance in planning, implementing, and managing the service.

A service level agreement can also be put in place to make sure a high level of service is provided. The cloud facility is hosted in a Class A data centre with high availability and redundancy.

Conclusion
The growth in 2-factor authentication and the move towards cloud computing, coupled with the increase in end points needing access to the company network and current financial insecurity, mean that hosted authentication is set to grow. It is likely to prove the best current option for many companies wanting to improve their access security.

Previous Post

Over three quarters of European Companies have Moved eMail to the Cloud

Next Post

Satellite Broadband Contract For Germany: Skylogic And Sat Internet Services Seal An Initial 3-Year Deal On KA-SAT

Next Post

Satellite Broadband Contract For Germany: Skylogic And Sat Internet Services Seal An Initial 3-Year Deal On KA-SAT

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Navigation

  • Authors
  • Author Login
  • Author Application
  • Advertisement
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
Social icon element need JNews Essential plugin to be activated.

© 2018 Globaltelconews.com

No Result
View All Result
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy

© 2018 Globaltelconews.com

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In