How to Choose an Authenticator. Or Two. Or Three.

When it Comes to Proving Users Are Who They Say They Are, There’s no Single Solution That Will Meet All Your Needs. 


As more organizations embrace alternatives to password-based authentication – including exploring authentication technologies that meet FIDO Alliance standards – now is the time to evaluate what methods of authentication will best serve your organization on the path to a passwordless future. There are a number of authenticators available now, and more on the way, thanks to constant innovation in the market. That’s good news if your organization, like many today, is seeing authentication requirements shift faster than ever. As the pace of change increases, there are more and more options to help your organization keep up or, even better, stay a step ahead. 


In today’s dynamic authentication environment, you not only have a lot of choices, but also a lot to think about. Push notifications, one-time passwords, SMS verification, biometrics and hardware tokens are just some of the types of authenticators available now. But no matter how many choices you have, one thing is certain: You’ll be best served by more than one. With the emergence of an increasingly dynamic workforce, there is no longer any single way to meet every user’s needs and achieve the optimum degree of security. To realize those goals, you need multiple approaches to authentication that work together. And to identify the most effective approaches for your organization, you need to consider three things: certainty, complexity and cost. 


1. Certainty: Who Do You Think They Are?


Certainty refers to the degree of confidence an organization can expect from its approach to authentication. How confident are you that those requesting access are who they claim to be? How confide ..

Support the originator by clicking the read the rest link below.