In today’s world, our digital credentials are one of the most sought-after pieces of information that enable threat actor effectiveness in their craft – stealing our identities, money and peace of mind. From individuals and families to industries, utilities and governments, the privacy and security of our digital identities and the underlying credentials that represent them is increasingly important as more of our connected lives become digital.
Today, several technologies and approaches exist that attempt to solve the challenge of security and privacy of our digital identities, including multi-factor authentication, single sign on, password managers and more. However, use of these solutions varies widely based on a number of factors, is inconsistent depending on the service, and is laden with complexity, often times frustrating the very people they are meant to protect.
It’s important to note that this problem is not just isolated to individuals or families, but also plagues corporations and governments where a compromised credential can potentially lead to unfettered access to vital corporate resources. This confluence of factors creates an opportunity for the industry to innovate and drive the change in how all people and companies access digital services that are now a part of the fabric of our daily lives.
Getting this right will require us to deliver a simple, secure and seamless experience for all people.
- Simple means incorporating passwordless technologies and simplifying the setup, workflow and outcomes of credential management across virtually any connected device.
- Secure means people are always protected against the latest cyber threats and that we are helping enable people to make the best security choices possible, by helping to protect themselves, their families, communities and businesses.
- Seamless means that people should have a unified experience across all services regardless of the authentication technologies the services support and across the many devices we now depend upon – from IoT to smartphones to laptops and tablets, and across business-connected services that make use of these interconnected digital personas.