Digital channels are more important than ever to how businesses reach their customers. And within the enterprise, communication and collaboration are more digitally-oriented than ever before. At the center of keeping it all secure is how users are authenticated, and that security is under siege.Weak authentication is being abused by criminals to compromise consumer accounts at depth and en masse. In response, regulators are raising the standards they expect businesses to implement to protect consumer accounts – not just for how strongly users are authenticated, but also how their data is protected. These threats to authentication extend beyond consumer applications into the enterprise as adversaries are gaining access to organizations’ internal systems to impersonate corporate users through weakly authenticated entry points, stealing data and facilitating fraud. Fortunately, adoption of strong authentication, which can mitigate attacks from criminals and other adversaries across consumer applications and within the enterprise, is on the rise as organizations respond to these threats and pressure from regulators.
This study explores how businesses are implementing authentication to secure consumer applications and the enterprise, the factors they consider when choosing an authentication solution, the role that strong authentication is playing within their organizations, and the benefits that these organizations are realizing. For real-world examples, this report also includes case studies of organizations that are leveraging FIDO-compliant solutions to protect customers’ accounts and the enterprise.