">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Sunday, January 17, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Gartner Inc. Says That By 2016 30% Of Firms Will Use Biometric Authentication

Caroline Vutagwa by Caroline Vutagwa
7 years ago
in Tech
6 min read
0

Related posts

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0

How to fuliza by Safaricom guide

January 15, 2021
0

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0

gartner

    
Gartner Inc. believes that the consummation of IT and business bring your own device (BYOD) programs have resulted in potential security problems for IT leaders.
People tend to be more concerned with simplicity and clarity of the phone rather than the security, and the same valuable data guarded by complex passwords and security measures on PCs can be left vulnerable on mobile devices.

Gartner predicts that, by 2016, 30 percent of organizations will use biometric authentication on mobile devices, up from five percent today.

“Mobile users staunchly resist authentication methods that were tolerable on PCs and are still needed to bolster secure access on mobile devices. Security leaders must manage users’ expectations and take into account the user experience without comprising security,” said Ant Allan, research vice president at Gartner.

The increased number of devices in play also exacerbates the exposure of critical information. Implementing standard power-on password policies is made much more complex by the acceptance of BYOD practices, with the inevitable clash over user rights and privacy.

While complex passwords can be especially problematic for users to type on mobile devices, if these devices hold corporate data or provide access to corporate systems such as email without further login, even a default four-digit password is inappropriate.

READ  Are Cheap TikTok Likes Inferior To Expensive Ones? Read Our Experts' Discussion

“An eight-digit numeric password will require hours to recover, and that will discourage casual hackers with toolkits,” said John Girard, vice president and distinguished analyst at Gartner. “However, even a six-character lowercase alphanumeric password can provide billions of values. For most practical purposes, hackers are not prepared to pursue this large a set of combinations due to the relatively slow speeds involved in brute force attacks against smartphones and tablets.”

Gartner recommends that a password policy requiring use of at least six alphanumeric characters, and prohibiting dictionary words, is enforced on devices with access to corporate information via mobile device management (MDM) tools.

“The best practice is to use encryption that is not tied to the primary power-on authentication, meaning the key cannot be recovered from the device after a soft wipe operation has been performed.”

In addition, Gartner recommends that a further authentication method, at a minimum, another password — should be used for access to sensitive corporate applications and data.

In some cases, higher-assurance authentication is required. In PCs (traditionally), a standalone device may be used to provide a hardware token that might be used to provide additional authentication.

“Traditional authentication of this kind is often spurned in mobile use cases, because of the poor user experience with most kinds of hardware tokens,” said Allan.

Software tokens, such as X.509 credentials on the endpoint, provide options in this case, but often need MDM tools to be implemented properly and still require additional controls to provide the higher-assurance authentication necessary in some organizations.

Readers 790

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Caroline Vutagwa

Caroline Vutagwa

Minding my own business is not enough for me that's why you will always find me minding Africa's Businesses as well as Technology and of course letting you know about it. Talk to me on [email protected]

Related Posts

cryptocurrencies

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0
How To

How to fuliza by Safaricom guide

January 15, 2021
0
Tech

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps
Tech

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0
Tech

Are Cheap TikTok Likes Inferior To Expensive Ones? Read Our Experts’ Discussion

January 15, 2021
0
Tech

Between WhatsApp, Facebook And Signal Which Platform Collects More Personal Data?

January 15, 2021
0
Tech

HTML5 Tech Takes Over from Flash to Advance E-Sports Industry

January 15, 2021
0
uganda-8
Tech

This Is Why The Ugandan Web Is Currently In Turmoil And Their Internet Has Been Shutdown

January 14, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

realme to release more phones in 2021 to grow its smartphone market share

January 16, 2021

What You Need To Know To Manage Your Network Effectively

January 16, 2021

Baidu establishes an Intelligent electric vehicle arm to bring autonomous cars on a road near you

January 15, 2021

Adam Molai’s JUA Kickstarter Fund Doubles to $2M to Kickstart African Entrepreneurship

January 15, 2021

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: