Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • IT Management

    Whats New in Authentication Technologies for Online Transactions?

    By
    eWEEK EDITORS
    -
    August 2, 2007
    Share
    Facebook
    Twitter
    Linkedin

      Q: There has been a lot of activity in the area of consumer authentication lately. Oracle acquired fraud prevention vendor Bharosa in July, EMC acquired knowledge-based authentication vendor Verid in June. Last year RSA acquired device ID vendor PassMark and risk analytics vendor Cyota, before being acquired in its turn by EMC, while another risk analytics vendor, Business Signatures, was swallowed up by Entrust. What is driving the rush to online consumer authentication?
      A: Financial institutions and online retailers are looking at two major areas of concern right now. One is identity theft, the other is fraud. In the financial services industry the catalyst for change comes from guidance issued by the FFIEC (Federal Financial Institutions Examination Council) mandating the implementation of consumer authentication. So today were seeing an explosion of deployment. Its not just in the banks covered by the FFIEC mandate, but also at online brokerages like Charles Schwab, and its beginning to spill over into the online retailing sector too. People really want to get a handle on these problems.

      Q: Is there a difference between online consumer authentication and the methods companies traditionally use to authenticate their own employees on internal networks?
      A: Yes. Companies can tell their employees what to do, and make sure that they do it. But they cant force consumers to behave in the same way. When a company hires you, they can hand you a hardware device like a smart card or a token that generates one-time-only passwords and insist that you use it. Or they can even require that you use some kind of biometric like fingerprints when you log on. But consumers cant be regimented like this, so you have to use technologies that are much more unobtrusive. This is a powerful constraint and it is driving a lot of vendors to develop new and creative solutions to the problem.

      Q: What are some of the basic choices for consumer authentication technology?
      A: Broadly speaking there are two kinds of solutions, which can be deployed together or separately. The most common kind is the risk analytic engine. In addition you are now starting to see a lot of deployment of advanced identity-proofing methods.

      Q: What do risk analytic engines do?
      A: They try to sniff out fraud based on the pattern of actions a consumer engages in online. This idea has been borrowed from the credit card industry, which has long used transaction analysis to detect fraud. For example, suppose I am an online banking customer of a big bank, and suppose I normally engage in simple activities like checking my account balance or setting up online bill payments for routine amounts. Then suddenly one day $3 million passes through my account on the way to North Korea. A risk analytic engine will flag this as abnormal.

      Q: Do these risk analytic engines work in real time?
      A: Originally you mostly had passive risk analysis that operated after the fact. You would have an engine sitting there combing automatically through a pile of transaction records, and when it flags something a live person in the fraud department will call you up and ask if you really meant to transfer $3 million to Kim Jong-ils cousin. This approach works for most transactions at financial institutions like bill payment or funds transfers, because these are not instantaneous actions. They take a little time to complete, so you still have time to detect fraud and stop it after the fact.

      Q: Is there a trend toward making these risk analytic engines more pro-active in detecting fraud rather than working after the fact?
      A: Yes. Now that deployment of these risk engines is becoming more widespread and beginning to move from just online banking to a broader range of online retailing, there is a desire to make them more active. One way to do this is for the system to issue a real-time challenge to the consumer for some additional online or offline authentication when an unusual transaction occurs, instead of bugging the consumer with a phone call two days later. This challenge will involve some form of identity proofing, which is the second major area companies are investing in after risk analytics.

      Q: This technology sounds pretty complicated. Are there any standards for risk analytic engines?
      A: No. This is pretty much a dark art right now. The solutions that the vendors are proposing are completely proprietary.

      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Careers

      SThree’s Sunny Ackerman on Tech Hiring Trends

      James Maguire - June 9, 2022 0
      I spoke with Sunny Ackerman, President/Americas for tech recruiter SThree, about the tight labor market in the tech sector, and much needed efforts to...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×