SYS-CON MEDIA Authors: Elizabeth White, Pat Romanski, Liz McMillan, Zakia Bouachraoui, William Schmarzo

News Feed Item

Research Shows Organizations Turning to Biometrics for a More Secure and Trusted Path to Authentication

Veridium, a leader in strong authentication solutions using biometrics instead of passwords and tokens, today released results of a new research study revealing that U.S. organizations are utilizing biometric authentication technology to prepare against the latest threats, as 63 percent of respondents whose organizations have experienced a data breach are implementing or planning to implement biometric authentication to prevent another one.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20180417005984/en/

Research shows organizations turning to biometrics for a more secure and trusted path to authenticat ...

Research shows organizations turning to biometrics for a more secure and trusted path to authentication. (Graphic: Business Wire)

The research, based on survey results from 200 U.S. senior IT decision makers, outlines how there is a lack of confidence of passwords alone to secure data sufficiently while highlighting how organizations are moving towards biometrics to better safeguard their most critical assets. Per the research, 81 percent of IT decision makers reported that they think biometric authentication secures their organizations' data better than passwords alone. By examining the challenges and trends of authentication methods across industries, the research uncovers adjustments that IT leaders need to make to better protect their data.

Key findings from the survey include:

  • The Prevalence of Data Breaches: Insights from the survey reinforce that organizations continue to be a target for threat vectors, with more than half (53%) of senior IT decision makers report that their organizations have experienced a data breach within the last five years.
  • GDPR’s Impact on Security Strategy: Upcoming regulations are cited to be a top consideration for U.S. IT decision makers as it relates to their security strategy, as 89 percent of respondents reported that the General Data Protection Regulation (GDPR) deadline is impacting their organizations' approach to managing and securing EU citizens' data.
  • Lack of Confidence in Passwords: While 99 percent of IT decision makers reported that they are currently using passwords in their organizations, only 34 percent of respondents are very confident that passwords alone can protect data sufficiently.
  • Employee Habits Pose Risk: Additionally, 83 percent of respondents reported that their employees use techniques to “bypass” password policy, the top ways include: storing passwords within a web browser or password manager (53%), reusing same characters, but add, change or adjust a number (50%) and writing down passwords (41%).
  • Harnessing the Power of Biometrics: The overwhelming majority of respondents agree that biometrics is the most secure authentication method for both organizations (86%) and consumers (86%) to use. Respondents believe the main reasons for using biometric authentication include overall better security (63%), increased workforce productivity (54%) and better accessibility (50%).

“Across industries, organizations that have experienced a security breach now outnumber those that haven’t as attackers have identified and exploited their security weaknesses,” said James Stickland, CEO, Veridium. “As the research has demonstrated, IT decision makers are recognizing that reliance on passwords alone is leaving them exposed to threats. Today, they are rethinking their authentication strategies and implementing biometrics to better secure their employees' and customers' most sensitive data.”

To learn more about the study and how your organization can optimize security within its organization, please visit here.

*This research was conducted in April 2018 using Vanson Bourne, with responses from 200 U.S. senior IT decision makers who work in organizations with more than 500 employees.

Additional Resources

About Veridium
Veridium is a leader in the development of strong authentication solutions using biometrics instead of traditional passwords, PINs, and tokens. Powered by an unmatched legacy of IP and R&D, our software increases security, improves convenience, and reduces fraud at a lower total cost of ownership than traditional multi-factor authentication (MFA) solutions. Veridium has offices in the U.S., U.K., and Romania. For additional information, please visit www.veridiumID.com.

About Vanson Bourne:
Vanson Bourne is an independent specialist in market research for the technology sector. Our reputation for robust and credible research-based analysis is founded upon rigorous research principles and our ability to seek the opinions of senior decision makers across technical and business functions, in all business sectors and all major markets. For more information, visit www.vansonbourne.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, int...
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
The current environment of Continuous Disruption requires companies to transform how they work and how they engineer their products. Transformations are notoriously hard to execute, yet many companies have succeeded. What can we learn from them? Can we produce a blueprint for a transformation? This presentation will cover several distinct approaches that companies take to achieve transformation. Each approach utilizes different levers and comes with its own advantages, tradeoffs, costs, risks, a...
This session describes how Professional Services organisations can deliver within Technology-as-a-Service (IaaS) constructs, in private and public enterprise cloud scenarios. See how professional services can be packaged and funded by IaaS cash flows, based upon consumption of technology services. Learn how significant, IT infrastructure transformations can be funded through OPEX spending models with multi-year As-a-Services based contracts. Understand how the automation of repeatable services c...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Enterprises are universally struggling to understand where the new tools and methodologies of DevOps fit into their organizations, and are universally making the same mistakes. These mistakes are not unavoidable, and in fact, avoiding them gifts an organization with sustained competitive advantage, just like it did for Japanese Manufacturing Post WWII.
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
Cloud computing is a goal aspired to by all organizations, yet those in regulated industries and many public sector organizations are challenged in adopting cloud technologies. The ability to use modern application development capabilities such as containers, serverless computing, platform-based services, IoT and others are potentially of great benefit for these organizations but doing so in a public cloud-consistent way is the challenge.
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching o...