Black Paper WHY A STRONG AUTHENTICATION
STRATEGY IS A MUST

THE PASSWORD IS DEAD; LONG LIVE THE HUMAN TOUCH

A single password reset request costs companies on average $70 every time. 30% to 50% of all IT help desk calls are regarding password resets. 57% of employees prefer passwordless authentication, and 56% would recommend a hardware device to manage their authentication.

THE HARSH CYBERSECURITY BUSINESS REALITY

Most successful cyberattacks are result from human errors, and 70% of all breaches originate from end-point devices. Deploying a solid security strategy makes sense. Besides analyzing your overall digital systems and working systematically to counteract weaknesses, you can take an effective first vital measure by:

→ Adding hardware-based authentication devices to perform strong authentication by leveraging fingerprint biometric

→ Optimizing the cybersecurity education of the individuals to increase the digital protection of your most sensitive information

ZERO TRUST IS NOT A SECURITY SOLUTION. IT IS A STRATEGY.

The Covid 19 pandemic forced many organizations to embrace remote work. This also accelerated the need to protect sensitive information as home networks often offer a poor security level. During the first six months of 2020 data breaches exposed 36 billion records. In May 2021 alone, another 8.4 billion passwords were published online. Recently one user posted billion password entries onto a popular hacker forum, exposing credentials such as private login information for Gmail, Facebook, Apple and PayPal. In other words, everybody’s security is at risk.

A ZERO-TRUST SECURITY MODEL IMPROVES THE CYBERSECURITY STRATEGY BY CREATING:

→ Network segmentation to bit by bit control traffic flow and reduce attack vectors

→ Trust zones that minimize the number of authorized users, protocols and transactions to access sensitive data

→ Zero trust segmentation that centralizes unknown threats detections, monitor network, data traffic and reports

CONSTANT HIGH-LEVEL R&D PREPARES THE WORLD FOR THE FUTURE

Most existing cybersecurity solutions and sensitive transactions are based on traditional cryptographic algorithms. The emergence of embedded systems and the rise of quantum computing have forced companies to rethink their product strategy quickly. Today, it is necessary to optimize the memory size and energy consumption of the cryptographic algorithms and to design innovative and new post-quantum algorithms.

Pone Biometrics has top research laboratories and researchers and continuously invests in research and development to deliver top-of-the-range solutions that combine convenience and high security. Our latest projects focus on:

→ Developing and embedding state of the art cryptographic mechanisms to include lightweight cryptographic, incremental cryptographic and postquantum cryptographic

→ Testing, selecting and embedding the best biometric sensor and associated enrolment and matching algorithms to protect the hardware against attacks on biometric capture devices (PAD) and to ensure that the match on the card complies to current security legislation and trends

→ Strengthening traditional firmware update by integrating recent trusted computing-based firmware update

Download the PDF version of this text