Unisys experts also predicted that consumers will embrace the accuracy and ease-of-use of fingerprint readers on the new Apple iPhone, leading to a broader acceptance of biometrics in general. This could jump start a rapid growth in the use of biometrics – including fingerprint, iris scanning and facial recognition – on consumer devices as a way to protect the devices and data, as well as a method to confirm the identities of users for activities such as online retail transactions.
The acceptance of biometrics will begin the evolution away from the traditional user ID/password combination used most frequently to verify online identities.
In addition, the ability to automatically pinpoint a user's specific device as well as its geographical location will give security managers insight into the "context" of that user's attempt to access the network. Contextual authentication solutions can alert managers when, for example, someone outside of a pre-determined geographical area attempts to access their networks.
In the same way, attribute-based access controls identify access requests that fall outside a user's normal pattern, such as attempts to obtain information they don't normally access or at unusual hours. By combining these insights with other identity management methods like biometrics, security professionals can make it much more difficult for those without permission to gain access to networks and applications.
Focus on securing mobile devices and apps
Unisys experts predicted a rise in security awareness and protection techniques related to enterprise BYOD (bring your own device) programs. For example, Steve Vinsik, Unisys' vice president for global security solutions, predicted a rise in "bring your own security" scenarios, in which employees using their own mobile devices for work also employ their own security measures – often without the consent or awareness of enterpr
|SOURCE Unisys Corporation|
Copyright©2012 PR Newswire.
All rights reserved