No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

What Implementing Biometrics for Authentication Looks Like

August 1, 2023
in Protection
0
Google Expands Passkey Support With Passwordless Authentication



While the idea of using biometrics for authentication is becoming more mainstream – helped along by the fact that many consumer devices such as smartphones and laptops now support biometrics – organizations still have to consider how to effectively implement biometrics within their environments.

“It’s hard to envision a future that doesn’t have biometrics,” says Gartner VP and analyst Ant Allan. “The question is ‘What is the most effective way to use biometrics?'”

“By commoditizing biometrics for cyber, we’re merging what was a high-stakes means of identification — fingerprints and crime scenes — with relatively low-stakes scenarios such as unlocking your phone, all for the sake of convenience. I’m not sure that’s a worthwhile trade off,” argues Sailpoint CISO Rex Booth.

For many enterprises, concerns over how the biometrics information is stored or what would happen if the data is stolen is typically the responsibility of the third-party vendor offering biometrics technology. Still, if that third-party vendor gets breached and the enterprise’s authentication data finds its way to the Dark Web, some blame will eventually land on the CISO’s desk. Regardless of the stolen data’s value to the thieves, no one should assume that criminals – given enough time and access to powerful equipment – won’t  be able to eventually unlock authentication data.

Sailpoint’s Booth argues that an enterprise using biometrics as a routine authentication approach could ultimately hurt the enterprise’s security, along with the security of all employees, contractors as well as partners who need access to enterprise systems.

“As somebody whose fingerprints are on file in a CCP database somewhere thanks to the OPM hack in 2015, I’ve accepted that I’ve lost control of my biometrics,” Booth says. “But that doesn’t mean I want to use them everywhere and risk losing further control for low-reward use cases. They should be reserved for meaningful scenarios.”

Build MFA by Combining Strategies

One common enterprise authentication strategy for biometrics is to embrace the original intent behind multifactor authentication (MFA). A popular criticism of enterprise MFA implementations is that they tend to use the weakest possible authentication approaches, such as unencrypted numbers sent via SMS, which is highly susceptible to man-in-the-middle attacks.

The better approach is to use a couple of high-security approaches, such as continuous authentication (CA) and behavioral analytics (BA). Continuous authentication concentrates on what systems are being accessed and what actions are being initiated. Behavioral analytics verifies user identity by comparing many dozens of different factors, such as errors per 100 keystrokes, typing speed, angle a phone is held, characteristics of the phone, time of day, and so on.

By definition, continuous authentication does not stop once an authentication is confirmed, but continually watches to see if the user misbehaves an hour later. After all, an insider attack will just about always pass the authentication hurdle because the attacker truly does have credentials — the user simply abuses the privilege by trying to steal money or data or to sabotage the system.

A very good tactic to make behavioral analytics more secure is frequently changing which attributes are considered and what users will be asked to do to confirm their identity. “Users can’t really predict what they will be prompted to do and when they will be prompted to do it” and that makes it much more difficult for a fraudster to be prepared, Allan says.

Multifactor authentication creates a more secure, layered approach so that the entire authentication doesn’t rest on a single point of failure. MFA might look like continuous authentication plus behavioral analytics plus something physical, such as a FIDO token.

To further strengthen the security, perhaps add one of the many authenticator apps. If the enterprise authentication program includes four or five highly secure approaches such as those, then biometrics can indeed serve as a convenient first step. That would mean that the biometrics could have a lenient setting, reducing user frustration without undermining the overall authentication effort.

Add Piggybacking to MFA

One way to lower authentication costs is by trusting and leveraging the biometrics within the smartphones that likely are already on the person of every user, an effort known as piggybacking. The plus side is that this comes with a lower cost; the downside is that IT and security have little to no say in how the biometrics are administered or protected. But if a sufficiently robust MFA is in place, even lenient settings may not be a problem.

“I think (piggybacking) is a great first step. Is (security doing biometrics themselves) necessary or is it just creating friction?” says Damon McDougald, the global Identity lead at Accenture. 

Gartner’s Allan also approves of the piggyback biometrics approach. “It’s something the users are already familiar with, and you’re avoiding paying for a third-party product and everything you need to wrap around it,” he says. “But the choice is technology is being made by somebody else. How is it being configured? The enrollment is not something you have control of.”

Accenture’s McDougald stresses that excessive friction with any form of authentication could deliver an unintended problem. “Humans are very creative when we have a problem. We’ll just bypass the authentication — and the bad guys can exploit that,” he says.

Editorial Team

Editorial Team

Related Posts

What 'Zone 2' Cardio Actually Means
Protection

What ‘Zone 2’ Cardio Actually Means

April 25, 2026
The Sony WH-CH720N Noise-Canceling Headphones Are Nearly Half Off
Protection

The Sony WH-CH720N Noise-Canceling Headphones Are Nearly Half Off

April 25, 2026
10 Hacks Every YouTube Music User Should Know
Protection

10 Hacks Every YouTube Music User Should Know

April 25, 2026
ChatGPT's Latest Update Makes It Harder Than Ever to Spot AI-Generated Images
Protection

ChatGPT’s Latest Update Makes It Harder Than Ever to Spot AI-Generated Images

April 24, 2026
The Xteink S4 Might Be the Pocket E-Reader of My Dreams
Protection

The Xteink S4 Might Be the Pocket E-Reader of My Dreams

April 24, 2026
X Now Has Its Own Chat App
Protection

X Now Has Its Own Chat App

April 24, 2026
Load More
Next Post
Live news: China new home sales post biggest monthly drop in a year

Live news: China new home sales post biggest monthly drop in a year

Popular News

  • Why Creating 'Gaussian Splats' Will Become Your Favorite Way to Preserve Family Memories

    Why Creating ‘Gaussian Splats’ Will Become Your Favorite Way to Preserve Family Memories

    0 shares
    Share 0 Tweet 0
  • The Best Places to Eat at Doha’s Hamad International Airport

    0 shares
    Share 0 Tweet 0
  • Trust Wallet Hack, Uniswap Fees, Coinbase

    0 shares
    Share 0 Tweet 0
  • US OPM evaluates cost of observer program looking at race discrimination in voting

    0 shares
    Share 0 Tweet 0
  • Iran conflict disrupts oil supply, raises Europe flight costs by $100

    0 shares
    Share 0 Tweet 0

Latest News

FOMC crypto

When Is The Next FOMC Meeting And What Are The Expectations For Crypto?

April 25, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure The Federal Open Market Committee (FOMC) meets...

Sr. Workforce Program Specialist - Internal Medicine, Cardiology

Sr. Workforce Program Specialist – Internal Medicine, Cardiology

April 25, 2026
0

Virginia Commonwealth University (VCU) School of Medicine is a premier academic medical center located in the heart of Richmond. Accounting...

Managing Long-Term Care Risk in Retirement

Managing Long-Term Care Risk in Retirement

April 25, 2026
0

Long-term care is one of the most consequential and misunderstood risks in retirement. It is not a routine expense that can...

Tips on Updating Beneficiaries to Your Federal Benefits

Tips on Updating Beneficiaries to Your Federal Benefits

April 25, 2026
0

An important topic that many federal employees overlook is making sure that their beneficiaries are up to date on several...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.