Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon Webinar Icon Webinar Icon White Paper Icon White Paper Icon

Enterprise Authentication Considerations & The Challenges of Buy vs. Build

2017-01-26_1241In today’s environment of both massive cyber breaches and individual identity hacks, authentication is key to the security of enterprise applications, data, and user information, both on the web and on mobile devices. The familiar ‘username and password pair’ has long been regarded as a poor method for authentication, yet many applications continue to rely on passwords alone.

Gartner and Twilio, who provide the Authy two-factor authentication service, recently discussed how enterprises can approach security: build an authentication service from scratch; buy an expert-designed service,  or eliminate the exposure to unnecessary risks by partnering with a cost-effective service that offers the flexibility to brand the experience and insert authentication where appropriate.

In this Twilio webinar, Anne Robinson, Director of Research for Identity and Access Management at Gartner, walks us through key considerations concerning application security and authentication. Joining the broadcast to detail the benefits of cloud-based API authentication solutions, is Simon Thorpe, Product Director for Authentication at Twilio. Simon touches on how APIs allow application developers to tightly integrate security into their software without impeding the user experience. Additionally, using an API allows businesses to rely on external security SMEs for research, development, penetration testing, auditing, and ongoing maintenance—and significant cost savings.

2017-01-26_1235Short on time? Here are the top takeaways:

  • Authentication is all about creating a link between a person in the physical world and the identity they possess in the digital world.
  • Phone-based authentication seems new to many, but it’s been in use for over a decade, initially via SMS or voice, which were then challenged by cost and connectivity.
  • Availability of authentication mechanisms has to be as good as, or better than, the service it’s protecting, especially in a global and 24/7 context.
  • If supplemental authentications (not just logins) are an afterthought, integration may end up costing more than siloed solutions.
  • Depending on your situation, cloud-based deployment may provide more flexibility than on-premise architecture.
  • Because infrastructure decisions impact hosting, protection, audits, incident management, event monitoring, and many other challenges, it must be part of the end-to-end transaction process. Authentication can’t occur in isolation.
  • It must be easy for users to discover and enroll in an authentication service. Likewise, when they’re no longer employed at an organization or no longer require authentication, the revocation must be strong and seamless.
  • Providing access to authentication in an emergency context must avoid becoming the weakest link.

Ready to take action? Please enjoy this Twilio webinar featuring Gartner.

  • Learn how to protect your web or mobile application better, even if you continue to use passwords.
  • Understand the pros and cons of authentication types.
  • Learn about how authentication APIs give the greatest flexibility.

After viewing the webinar, we welcome you to find out more about Authy, Twilio’s two-factor authentication service.

 

About the author Severine Griziaux

Severine is the Marketing Manager for Authy at Twilio. Before joining Twilio, she was running the marketing for a software company in the search industry. Combining a mix of professional leadership development and business strategy earned throughout her previous experiences, her main focus is to bring the company to light in order to make developers and users understand why and how 2FA can make the web a safer place with Authy. Just a matter of organization, according to her.