The relevance of security token authentication in the modern IT world

apple-iphone-5-ios-6-580x358

IT managers and managing directors around the globe are faced with continuing questions over the issue of accessing corporate networks and data using private end terminals.

“How can we enable secure access for mobile devices without endangering our data?”

One suitable approach is the use of a double layer of security which involves identifying users by means of tokenless two-factor authentication. Are security tokens still relevant? This approach combines personal log in details, as the first factor, and a dynamic passcode received by smart phone, tablet or other mobile device, as the second.

Working with private computers and other devices for business reasons is becoming increasingly common. As revealed in the latest survey by industry association BITKOM – “The most important technology and market trends according to ICT companies“, 27% of all the businesses that took part are currently focusing on the issue of BYOD. And there is also considerable interest in mobile applications (48%) and the issue of IT security in general (33%). Two important requirements clash when it comes to BYOD: for employees the greatest possible flexibility is desired, together with a straightforward login process, whilst for employers it is important to ensure the best possible security for networks and data.

Double layer of security

As IT security measures have developed, and in particular with regard to identification processes, security experts have started combining multiple mechanisms. This is the case with two-factor authentication – in order to allow unambiguous identification, at least two of three possible security factors are required, with these three factors being:

  • Something known only to the user (e.g. password or PIN);
  • A tangible item that the user alone possesses (e.g. a mobile phone);
  • Something that is intrinsically connected to the user (e.g. iris of the eye).

An everyday example is taking out money from an ATM – the customer needs his/her personal bank card and a PIN to enact a successful transaction. The drawback in this case is that the bank card (or token, in terms of corporate network terminology) must always be carried around by the user. In addition to this issue, the costs relating to the use of tokens should not be underestimated by companies. In this context, managers must take into account costs relating to initial procurement of the tokens and also for issuing replacements in the case of loss or theft.

Drawing on existing resources

Modern solutions go a step further and work on the principle of “BYOT”: Bring your own token. Instead of using additional tools, such applications make use of existing devices as access tools, with these in this particular case being mobile devices. The advantage with this approach is that smart phones have become an almost constant companion for most people anyway in their everyday lives. And at work most employees usually have their mobile phone, tablet or laptop with them.

In order to enable secure and unambiguous identification, BYOT solutions combine a “passcode factor” and a “personal log in details factor“. For the latter, the user has a personally-defined user name and password, as well as a personal access licence. And for the first factor, the user is sent a dynamically generated, one-time valid, numeric passcode to his or her mobile device, by SMS, e-mail or via an app. Companies do not therefore have to install additional software or hardware on devices, where staff use not only company devices but also private devices for accessing internal data. This avoids the risk of employees feeling that they are being imposed upon by having to install additional software on their private devices.

Integrated expiry date

When the user enters his/her passcode while logging in, that particular sequence of numbers expires as soon as it has been entered and the system automatically generates a new code and sends this to the user’s mobile device. The same principle applies in the case of incorrect entries when logging in. It is possible to define how many incorrect logins are permitted before access is completely denied. Alternatively users can be sent a re-usable passcode for a predefined length of time that automatically expires with a new combination of numbers being periodically resent one day before it is required. This replacement of codes ensures that a valid passcode is always available and that acute transmission problems in mobile phone networks do not prevent successful execution of the log in process.

Two-factor authentication in practice

A two-factor authentication approach as described here has been implemented for example at T-Mobile. The company was in fact the first mobile phone operator to implement a solution that utilises mobile telephones for remote authentication. This allows staff to identify themselves, regardless of location, using a mobile telephone, a password and a dynamically generated passcode which is sent to the mobile device. As each employee is the only person that knows both of his or her respective factors, third parties have no way of accessing the network and stealing data. A total of 15,000 employees now work with the tool, and managers have noted that this had led to significant time and cost savings, as the expensive acquisition of additional hardware tokens is not required. Furthermore, it is not necessary to conduct time-consuming training sessions.

Summary

Companies that use two-factor authentication benefit from a double layer of security, as the log in process combines a user-defined user name and password with a dynamically generated passcode plus a user licence. So even if the password is discovered by someone else, third party access is still prevented because the other factors remain unknown. Such solutions are also attractive in terms of cost, as the company only has to invest in the central application, and the expensive acquisition of additional tokens is not required. A calculator available at www.securenvoy.com can be used to determine approximate cost savings resulting from a switch to a tokenless method of authentication. Token setup, distribution, re-issue in the case of loss or theft and IT support are also unnecessary.

Contact

www.securenvoy.com

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…

News Desk

View all the latest, product, project and people news

News Desk

Click Here

Technology News

Keep up-to-date with the latest product innovation

Technology News

Click Here

Industry Sectors

Discover technology in action in all applications

Industry Sectors

Click Here

Enter The Awards

Showcase personal or organisation excellence

Advertise With Us

Reach decision makers and amplify your marketing

Advertise With Us

Click Here
Scroll to Top