Story image

Gartner: Smartphone biometrics coming to the workplace

14 Feb 2019

By 2022, Gartner predicts that 70% of organisations using biometric authentication for workforce access will implement it via smartphone apps, regardless of the endpoint device being used - in 2018, this figure was fewer than 5%.

Lower costs and improved user experience/customer experience (UX/CX) are fueling this increasing interest in biometric authentication.

“Security and risk management leaders responsible for identity and access management (IAM) and fraud prevention continue to seek approaches for identity corroboration that balance trust and accountability against the total cost of ownership and UX/CX,” says Gartner research vice president Ant Allan.

“Biometric authentication uses biological or behavioural traits unique to each person and offers better UX/CX and accountability than other common methods. Implementing this via smartphone apps provides more consistency in UX/CX and is technically simpler than supporting it directly on a variety of different endpoint devices.”

Midsize and large organisations looking to implement biometric authentication via smartphone apps must be aware that biometric approaches that can be readily supported on any smartphone are vulnerable to presentation attacks or ‘spoofing’ using photos, videos, voice recordings, and so on. 

Therefore, presentation attack detection or ‘liveness testing’ is essential.

Gartner predicts that, by 2022, 40% of global midsize and larger organisations will use IAM capabilities delivered as software as a service (SaaS) to fulfill most of their needs - up from 5% in 2018.

SaaS-delivered IAM is often deployed to enhance access management software implementations. 

The ease of implementation and rapid time to value of SaaS-delivered IAM offerings have proved valuable to organisations that favour SaaS adoption and do not consider the operational management of IAM functionality core to their business.

“Based on our client interactions, most SaaS-delivered IAM purchases are for access management and lightweight identity governance and administration functionality, such as single sign-on,” says Gartner associate research principal analyst Abhyuday Data.

“These offerings provide excellent connectivity and include solid access management and password management features. B2B and B2C are the most established use cases with matured access management capabilities.”

The steady movement of applications to cloud and mobile architectures is also influencing adoption. 

The combination of functional offerings that are configured, rather than customised, and modern application architectures is causing a substantial portion of the market to adopt SaaS-delivered IAM.

“Organisations looking to use SaaS-delivered IAM should first ensure they have established satisfactory and well-supported traditional IAM software stacks. They then need to consider SaaS-delivered IAM once functional needs are met and the organisational benefits are realised,” says Data.

Ingram Micro adds to IoT portfolio with Roambee
Roambee specialises in supply chain, logistics and asset management solutions, adding another layer for the distie’s IoT solutions.
Data center colocation market to hit $90b in next five years
As data center services grow in popularity across enterprises large and small, the colocation market is seeing the benefits in market size.
Acer’s new programme and portal for partners
A simple and manageable programme designed to incentivise, recognise and reward commercial partner achievements.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Galaxy S10: Apple notch, meet the Samsung ‘punchhole’
With three unique devices, the Galaxy S10 range is engineered to meet the needs of today’s smartphone market.
In ongoing cloud war, Google to acquire data migration specialist
Google is currently behind AWS and Microsoft in the cloud battle, and it would seem this play is an attempt to claw some ground back.
Dumped: Lenovo DCG gives Ingram Micro the cold shoulder
Lenovo Data Centre Group (Lenovo DCG) has left Ingram Micro out in the cold, after dumping them in favour of an exclusive distribution agreement with Dicker Data.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.