30 likes | 104 Views
The ability to associate a stream of electrons with a carbon based life form is more difficult than it sounds. For years, we’ve relied on passwords to accomplish this trick. According to a recent study by Verizon, 80% of security breaches are caused by password security failures.
E N D
Gluu’s endorsement of Toopher for a Texas Emerging Technology Fund Grant One of Gluu’s partners for strong authentication is applying for a grant from the Texas Emerging Technology Fund from the Governor¹s office. They’ve asked Gluu to provide some feedback as to why we love the Toopher service and two factor security. The ability to associate a stream of electrons with a carbon based life form is more difficult than it sounds. For years, we’ve relied on passwords to accomplish this trick. According to a recent study by Verizon, 80% of security breaches are caused by password security failures. So something must be done to improve security. Any organization that authenticates either employees or customers is facing this issue. There are many ways to authenticate a person other than passwords. Another recent study analyzed two decades of research on mechanisms to replace passwords, and scored them based on a set of twenty-five usability, “deploy ability” and security benefits. In this analysis, it found that mobile out-of-band solutions like Toopher, were easy to use, efficient to use, and resulted in infrequent errors. This matches Gluu’s experience with Toopher. In our opinion, the price, usabilty and security of mobile phone sso authentication solutions offers the most promising technology for mass adoption.
Possession of the mobile phone is such a strong authentication factor, that the FIPS 201-2 guidelines introduced the idea of “Derived Credentials” to augment the use of PKI smart cards, a mainstay for paranoid organizations everywhere. In fact, the best usability for an authentication mechanism is the one you never see. Toopher’s automatic location based authentication solution is one of the only offerings in the market that makes this possible. We believe that Toopher will not stop here, but will continue to define more adaptive authentication solutions that will leverage the rich data set that is collected by the smart device. Cyber security is a rapidly growing global market and positioning Texas to be a leader in this area would be beneficial to our economy. San Antonio is actively supporting growth of the cyber-security market
. Austin in particular has been a hotspot for identity security. This blog from Dice.com reports that Austin’s tech industry employment growth from 2001 to 2013 was 41.4 percent, while its STEM occupation growth was 17.1 percent. It also warns that a downsizing of Dell may effect 9,000 out of 14,000 Dell employees in central Texas. Texas should look to Masachusetts, famed for its crypto genius, as an example. A recent article reports that the cyber security business has grown 10.5% in central Massachusetts over the past two years, from $8.57 billion in the first half of 2011 to $9.47 billion in the first half of last year. To the extent that the state can foster this nascent cyber security and information security ecosystem, it plays to the strength of the technical talent of our citizens, and could help establish Texas as a leading exporter of IT security to the world. Article resource:-www.blogster.com/thegluuserver/gluus-endorsement-of-toopher-for-a-texas-emerging-technology-fund-grant