SlideShare a Scribd company logo
WEBINAR
CONSUMER VIEWS ON
AUTHENTICATION
APRIL 2017
NEW RESEARCH ON PERSPECTIVES AND TRENDS
2
THE DEATH OF PASSWORDS
2004
2012
2016
• components
“ Z O M B I E T E C H N O L O G Y ” D E M O N S T R A T E D
“But I’m
Not Dead Yet!”The Mat Honan
Hack and the Year
of the Mega Breach
Bill Gates
at the RSA
Conference
3
6 billion records compromised since 2013
(Last year, 1.5 billion from Yahoo alone)
4
How do consumers value
authentication?
How do consumers react
to poor experiences?
What preferences exist for
types of access controls?
How will FIs adapt to these
preferences?
When will we turn the
corner to “passwordless”?
5
J UL I E C ON R OY
R E S E A R C H D I R E C T O R
n Head of Aite Group’s Retail Banking & Payments practice, covering
fraud, data security, anti-money laundering, and compliance.
n VP-level product management roles in financial services, risk
management and payment processing.
M I C H AEL TH EL AN D ER
D I R E C T O R P R O D U C T M A R K E T I N G , I O V A T I O N
n Manages go-to-market, launch and customer education activities for
iovation’s authentication products.
n 20 years in VP- and director-level product management and product
marketing roles for information security companies.
6
TODAY
A G E N D A
WHO WE SURVEYED
PRIORITIES FOR ONLINE BANKING
HOW BAD ARE WE AT USING PASSWORDS?
PREFERRED ONLINE AND MOBILE METHODS
RECOMMENDATIONS AND TURNING THE CORNER
WHO WE SURVEYED
8
WHO DID WE SURVEY?
1 , 0 9 5 C O N S U M E R S A C R O S S A L L A G E G R O U P S
The survey distribution reflects
overall U.S. population
distribution
“Omnichannel” users across
mobile and web formats
PRIORITIES
10
WHAT’S IMPORTANT?
S I M I L A R I T I E S … A N D S O M E K E Y D I F F E R E N C E S
n Ease of use is as
important, for most
groups, as passive
fraud prevention
n Interactive security
and protection is
increasingly valued
n A desire for “robust
transactional
capabilities” created
the biggest delta
between groups
11
n Transaction tagging
n Flexible reporting and
transaction searching
n Internal and external
transfers
n Integration with tax
services and apps
n Digital onboarding
n Portfolio
management
WHAT’S IMPORTANT?
S I M I L A R I T I E S … A N D S O M E K E Y D I F F E R E N C E S
HOW BAD ARE WE
AT USING
PASSWORDS?
13
n 107 accounts per
average user, expected
to be 207 by 2020
(Survey by Dashlane 2014)
n Paradoxically, the better
we do at password
hygiene, the worse
usability becomes:
dFouY#4!9n is a strong
password but a
nightmare to manage
NUMBER OF UNIQUE PASSWORDS
S E C U R I T Y E X P E R T S R E C O M M E N D U N I Q U E P A S S W O R D S
14
n “Extremely frustrated” or
even “Very frustrated”
customers are at odds
with the goals of most
product owners
n And increasingly, even
their paychecks
RESPONSE TO FORGOTTEN PASSWORDS
I N A W O R L D W H E R E E X P E R I E N C E I S K I N G , F O R G O T T E N P A S S W O R D S A R E A N A T H E M A
PREFERRED ONLINE
AND MOBILE METHODS
16
Device fingerprint: a collection of hardware
and software attributes associated with a
specific device, including device location
Eye vein biometric: Uses the device’s video
recorder to capture distinct eye patterns
Facial recognition: Uses the device’s video
recorder to capture facial shapes, with
added tests for “liveliness”
Fingerprint biometric: Leverages a device’s
embedded fingerprint reader
Knowledge-based authentication: KBA
questions provide identity based on the
answers to shared secrets
Mobile network operator data: Uses the
operator’s own systems for authentication
and authorization
One-time password: Sends a one-time
password via text messaging or mobile
push
Two-way text: Like OTP via text messages,
but allows for consumer responses like
“Approve” or “Deny”
Voice recognition: Unique biometric based
on the characteristics of the user’s voice
But what do consumers
prefer?
17
PREFERENCES
T O P F I V E P R E F E R E N C E S F O R E A S E O F U S E A N D P E R C E I V E D E F F E C T I V E N E S S
Username/password
Fingerprint biometric
KBA
Device identification
Facial recognition
EASE OF USE EFFECTIVENESS
Fingerprint biometric
Eye biometric
Username/Password
KBA
Facial recognition
18
WILLINGNESS TO ENGAGE
• Preferences for Mobile
push and Two-way text
• But also Some markedly
negative responses
• Particularly among
Seniors’ dislike for Mobile
push technologies…
• And in every demographic
a negative response to
voice recognition
RECOMMNEDATIONS
AND TURNING THE
CORNER
20
n One quarter are
not interested in
changing,
regardless of the
use of incentives
n More than half
would change
even without an
incentive
n The balance could
be persuaded to
change with $10 to
$25 incentive
WILL INCENTIVES CHANGE BEHAVIOR?
A N D H O W M U C H I N C E N T I V E I S R E Q U I R E D ?
21
n Differences
between
demographic
groups can be stark
WILL INCENTIVES CHANGE BEHAVIOR?
A N D H O W M U C H I N C E N T I V E I S R E Q U I R E D ?
22
n Start with the mobile channel
n Enable multiple forms of authentication
n Leverage the complementary nature of
notification and authentication strategies
n Tailor education to customer’s demographic group
n Consider providing incentives to shift behavior
RECOMMENDATIONS
Something
you KNOW
Something
you HAVE
Something
you ARE
23
A THREE-PRONGED APPROACH
C O L L A B O R A T I O N B E T W E E N C O N S U M E R S A N D T E C H C O M P A N I E S
Consumers
Tech Companies
ENLIGHTENED & CONCERNED
CONSUMERS
HARDWARE & DEVICE
MANUFACTURERS
AUTHENTICATION SOFTWARE
PROVIDERS
ACME
24
A THREE-PRONGED APPROACH
C O L L A B O R A T I O N B E T W E E N C O N S U M E R S A N D T E C H C O M P A N I E S
Consumers
Tech Companies
ACME
Still leaves the
problem of entrusting
your credentials to a
centralized store that
could be breached
Focused on ways to
make “future
concepts” a current
reality
25
G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S
RESOURCES
AITE REPORT ON
CONSUMER PERSPECTIVES
A comprehensive survey of consumer
perspectives on authentication and the
responses needed by the FI community
ADDITIONAL RESEARCH
AVAILABLE SOON
Follow-on research on the impact false
positives have on customer experience
Q&A

More Related Content

Viewers also liked

Proyecto de corrosion
Proyecto de corrosionProyecto de corrosion
Proyecto de corrosion
JANNET023
 
Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017
Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017
Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017
Alluxio, Inc.
 
La tecnologia y la informacion en los ultimos tiempos
La tecnologia y la informacion en los ultimos tiemposLa tecnologia y la informacion en los ultimos tiempos
La tecnologia y la informacion en los ultimos tiempos
emersonlinares2001
 
3Com 3C16986
3Com 3C169863Com 3C16986
3Com 3C16986
savomir
 
Interferencia intersimbólica-isi-1
Interferencia intersimbólica-isi-1Interferencia intersimbólica-isi-1
Interferencia intersimbólica-isi-1
JERRYIPNESIME
 
Teorías y corrientes pedagógicas2
Teorías y corrientes pedagógicas2Teorías y corrientes pedagógicas2
Teorías y corrientes pedagógicas2
Rubi Hdz Mora
 
Tarea 3
Tarea 3Tarea 3
TIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICO
TIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICOTIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICO
TIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICO
ROGELIO RODRIGUEZ GONZALEZ
 
4º ESO, Postimpresionismo
4º ESO, Postimpresionismo4º ESO, Postimpresionismo
4º ESO, Postimpresionismo
Mercedes Ruano
 
Colors 1
Colors   1Colors   1
S4 tarea4 jasad
S4 tarea4 jasadS4 tarea4 jasad
S4 tarea4 jasad
Dallana Javier
 
Situación de aprendizaje
Situación de aprendizajeSituación de aprendizaje
Situación de aprendizaje
Evelyn Vanessa Chavez Rodríguez
 
Miriam proyecto 2
Miriam proyecto 2Miriam proyecto 2
Miriam proyecto 2
Miriam Edith Mendieta Beltor
 
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
TransUnion
 
12 2 chords and arcs concepts
12 2 chords and arcs concepts12 2 chords and arcs concepts
12 2 chords and arcs concepts
LomasGeomConc16
 
3Com 3C10318
3Com 3C103183Com 3C10318
3Com 3C10318
savomir
 
Favorite food France
Favorite food FranceFavorite food France
Favorite food France
EcoleArencBachas
 
Higiene y seguridad indusrtial
Higiene y seguridad indusrtialHigiene y seguridad indusrtial
Higiene y seguridad indusrtial
daniel acosta cubides
 
Task 2
Task 2Task 2
smjestajni kapaciteti Rijeke
smjestajni kapaciteti Rijekesmjestajni kapaciteti Rijeke
smjestajni kapaciteti Rijeke
Mauro Ćiković
 

Viewers also liked (20)

Proyecto de corrosion
Proyecto de corrosionProyecto de corrosion
Proyecto de corrosion
 
Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017
Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017
Unify Data at Memory Speed by Haoyuan Li - VAULT Conference 2017
 
La tecnologia y la informacion en los ultimos tiempos
La tecnologia y la informacion en los ultimos tiemposLa tecnologia y la informacion en los ultimos tiempos
La tecnologia y la informacion en los ultimos tiempos
 
3Com 3C16986
3Com 3C169863Com 3C16986
3Com 3C16986
 
Interferencia intersimbólica-isi-1
Interferencia intersimbólica-isi-1Interferencia intersimbólica-isi-1
Interferencia intersimbólica-isi-1
 
Teorías y corrientes pedagógicas2
Teorías y corrientes pedagógicas2Teorías y corrientes pedagógicas2
Teorías y corrientes pedagógicas2
 
Tarea 3
Tarea 3Tarea 3
Tarea 3
 
TIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICO
TIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICOTIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICO
TIPS PARA EL BUEN USO DE PRODUCTOS BIOLOGICOS MEXICO
 
4º ESO, Postimpresionismo
4º ESO, Postimpresionismo4º ESO, Postimpresionismo
4º ESO, Postimpresionismo
 
Colors 1
Colors   1Colors   1
Colors 1
 
S4 tarea4 jasad
S4 tarea4 jasadS4 tarea4 jasad
S4 tarea4 jasad
 
Situación de aprendizaje
Situación de aprendizajeSituación de aprendizaje
Situación de aprendizaje
 
Miriam proyecto 2
Miriam proyecto 2Miriam proyecto 2
Miriam proyecto 2
 
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
 
12 2 chords and arcs concepts
12 2 chords and arcs concepts12 2 chords and arcs concepts
12 2 chords and arcs concepts
 
3Com 3C10318
3Com 3C103183Com 3C10318
3Com 3C10318
 
Favorite food France
Favorite food FranceFavorite food France
Favorite food France
 
Higiene y seguridad indusrtial
Higiene y seguridad indusrtialHigiene y seguridad indusrtial
Higiene y seguridad indusrtial
 
Task 2
Task 2Task 2
Task 2
 
smjestajni kapaciteti Rijeke
smjestajni kapaciteti Rijekesmjestajni kapaciteti Rijeke
smjestajni kapaciteti Rijeke
 

Similar to Consumer Views on Authentication with Aite Group

The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovation
TransUnion
 
Consumer 2020
Consumer 2020Consumer 2020
Consumer 2020
PSFK
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
TransUnion
 
Digital Banking
Digital BankingDigital Banking
Digital Banking
Nikolay Spasov
 
Building engaging websites and experiences
Building engaging websites and experiencesBuilding engaging websites and experiences
Building engaging websites and experiences
Stefan Tornquist
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
TransUnion
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
SophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
Sophia Price
 
Future of customer onboarding in banks
Future of customer onboarding in banksFuture of customer onboarding in banks
Future of customer onboarding in banks
Nikunj Gundaniya
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
TransUnion
 
How to improve Customer Engagement
How to improve Customer EngagementHow to improve Customer Engagement
How to improve Customer Engagement
Susanne B. Böck
 
10 Ways Market Researchers can Tap into Social Media Platforms
10 Ways Market Researchers can Tap into Social Media Platforms10 Ways Market Researchers can Tap into Social Media Platforms
10 Ways Market Researchers can Tap into Social Media Platforms
Delvinia
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
TransUnion
 
ROne
ROneROne
ROne
Wossname
 
Present & Future: Customer Service
Present & Future: Customer ServicePresent & Future: Customer Service
Present & Future: Customer Service
Contact Centre Management Group
 
Building Engaging Websites and Digital Experiences
Building Engaging Websites and Digital ExperiencesBuilding Engaging Websites and Digital Experiences
Building Engaging Websites and Digital Experiences
DNN
 
Digital thinking to transform insurance in Asia by Hugh Terry
Digital thinking to transform insurance in Asia by Hugh TerryDigital thinking to transform insurance in Asia by Hugh Terry
Digital thinking to transform insurance in Asia by Hugh Terry
The Digital Insurer
 
Risk42 - NOAH19 London
Risk42 - NOAH19 LondonRisk42 - NOAH19 London
Risk42 - NOAH19 London
NOAH Advisors
 
A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry
The Digital Insurer
 
#TDC18 - MetaPack - eCommerce - The three year review from MetaPack
#TDC18 - MetaPack - eCommerce - The three year review from MetaPack#TDC18 - MetaPack - eCommerce - The three year review from MetaPack
#TDC18 - MetaPack - eCommerce - The three year review from MetaPack
MetaPack
 

Similar to Consumer Views on Authentication with Aite Group (20)

The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovation
 
Consumer 2020
Consumer 2020Consumer 2020
Consumer 2020
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
 
Digital Banking
Digital BankingDigital Banking
Digital Banking
 
Building engaging websites and experiences
Building engaging websites and experiencesBuilding engaging websites and experiences
Building engaging websites and experiences
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
Future of customer onboarding in banks
Future of customer onboarding in banksFuture of customer onboarding in banks
Future of customer onboarding in banks
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
How to improve Customer Engagement
How to improve Customer EngagementHow to improve Customer Engagement
How to improve Customer Engagement
 
10 Ways Market Researchers can Tap into Social Media Platforms
10 Ways Market Researchers can Tap into Social Media Platforms10 Ways Market Researchers can Tap into Social Media Platforms
10 Ways Market Researchers can Tap into Social Media Platforms
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
ROne
ROneROne
ROne
 
Present & Future: Customer Service
Present & Future: Customer ServicePresent & Future: Customer Service
Present & Future: Customer Service
 
Building Engaging Websites and Digital Experiences
Building Engaging Websites and Digital ExperiencesBuilding Engaging Websites and Digital Experiences
Building Engaging Websites and Digital Experiences
 
Digital thinking to transform insurance in Asia by Hugh Terry
Digital thinking to transform insurance in Asia by Hugh TerryDigital thinking to transform insurance in Asia by Hugh Terry
Digital thinking to transform insurance in Asia by Hugh Terry
 
Risk42 - NOAH19 London
Risk42 - NOAH19 LondonRisk42 - NOAH19 London
Risk42 - NOAH19 London
 
A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry
 
#TDC18 - MetaPack - eCommerce - The three year review from MetaPack
#TDC18 - MetaPack - eCommerce - The three year review from MetaPack#TDC18 - MetaPack - eCommerce - The three year review from MetaPack
#TDC18 - MetaPack - eCommerce - The three year review from MetaPack
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
TransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
TransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
TransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
TransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
TransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
TransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
TransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
TransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
TransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 

Recently uploaded

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 

Recently uploaded (20)

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 

Consumer Views on Authentication with Aite Group

  • 1. WEBINAR CONSUMER VIEWS ON AUTHENTICATION APRIL 2017 NEW RESEARCH ON PERSPECTIVES AND TRENDS
  • 2. 2 THE DEATH OF PASSWORDS 2004 2012 2016 • components “ Z O M B I E T E C H N O L O G Y ” D E M O N S T R A T E D “But I’m Not Dead Yet!”The Mat Honan Hack and the Year of the Mega Breach Bill Gates at the RSA Conference
  • 3. 3 6 billion records compromised since 2013 (Last year, 1.5 billion from Yahoo alone)
  • 4. 4 How do consumers value authentication? How do consumers react to poor experiences? What preferences exist for types of access controls? How will FIs adapt to these preferences? When will we turn the corner to “passwordless”?
  • 5. 5 J UL I E C ON R OY R E S E A R C H D I R E C T O R n Head of Aite Group’s Retail Banking & Payments practice, covering fraud, data security, anti-money laundering, and compliance. n VP-level product management roles in financial services, risk management and payment processing. M I C H AEL TH EL AN D ER D I R E C T O R P R O D U C T M A R K E T I N G , I O V A T I O N n Manages go-to-market, launch and customer education activities for iovation’s authentication products. n 20 years in VP- and director-level product management and product marketing roles for information security companies.
  • 6. 6 TODAY A G E N D A WHO WE SURVEYED PRIORITIES FOR ONLINE BANKING HOW BAD ARE WE AT USING PASSWORDS? PREFERRED ONLINE AND MOBILE METHODS RECOMMENDATIONS AND TURNING THE CORNER
  • 8. 8 WHO DID WE SURVEY? 1 , 0 9 5 C O N S U M E R S A C R O S S A L L A G E G R O U P S The survey distribution reflects overall U.S. population distribution “Omnichannel” users across mobile and web formats
  • 10. 10 WHAT’S IMPORTANT? S I M I L A R I T I E S … A N D S O M E K E Y D I F F E R E N C E S n Ease of use is as important, for most groups, as passive fraud prevention n Interactive security and protection is increasingly valued n A desire for “robust transactional capabilities” created the biggest delta between groups
  • 11. 11 n Transaction tagging n Flexible reporting and transaction searching n Internal and external transfers n Integration with tax services and apps n Digital onboarding n Portfolio management WHAT’S IMPORTANT? S I M I L A R I T I E S … A N D S O M E K E Y D I F F E R E N C E S
  • 12. HOW BAD ARE WE AT USING PASSWORDS?
  • 13. 13 n 107 accounts per average user, expected to be 207 by 2020 (Survey by Dashlane 2014) n Paradoxically, the better we do at password hygiene, the worse usability becomes: dFouY#4!9n is a strong password but a nightmare to manage NUMBER OF UNIQUE PASSWORDS S E C U R I T Y E X P E R T S R E C O M M E N D U N I Q U E P A S S W O R D S
  • 14. 14 n “Extremely frustrated” or even “Very frustrated” customers are at odds with the goals of most product owners n And increasingly, even their paychecks RESPONSE TO FORGOTTEN PASSWORDS I N A W O R L D W H E R E E X P E R I E N C E I S K I N G , F O R G O T T E N P A S S W O R D S A R E A N A T H E M A
  • 16. 16 Device fingerprint: a collection of hardware and software attributes associated with a specific device, including device location Eye vein biometric: Uses the device’s video recorder to capture distinct eye patterns Facial recognition: Uses the device’s video recorder to capture facial shapes, with added tests for “liveliness” Fingerprint biometric: Leverages a device’s embedded fingerprint reader Knowledge-based authentication: KBA questions provide identity based on the answers to shared secrets Mobile network operator data: Uses the operator’s own systems for authentication and authorization One-time password: Sends a one-time password via text messaging or mobile push Two-way text: Like OTP via text messages, but allows for consumer responses like “Approve” or “Deny” Voice recognition: Unique biometric based on the characteristics of the user’s voice But what do consumers prefer?
  • 17. 17 PREFERENCES T O P F I V E P R E F E R E N C E S F O R E A S E O F U S E A N D P E R C E I V E D E F F E C T I V E N E S S Username/password Fingerprint biometric KBA Device identification Facial recognition EASE OF USE EFFECTIVENESS Fingerprint biometric Eye biometric Username/Password KBA Facial recognition
  • 18. 18 WILLINGNESS TO ENGAGE • Preferences for Mobile push and Two-way text • But also Some markedly negative responses • Particularly among Seniors’ dislike for Mobile push technologies… • And in every demographic a negative response to voice recognition
  • 20. 20 n One quarter are not interested in changing, regardless of the use of incentives n More than half would change even without an incentive n The balance could be persuaded to change with $10 to $25 incentive WILL INCENTIVES CHANGE BEHAVIOR? A N D H O W M U C H I N C E N T I V E I S R E Q U I R E D ?
  • 21. 21 n Differences between demographic groups can be stark WILL INCENTIVES CHANGE BEHAVIOR? A N D H O W M U C H I N C E N T I V E I S R E Q U I R E D ?
  • 22. 22 n Start with the mobile channel n Enable multiple forms of authentication n Leverage the complementary nature of notification and authentication strategies n Tailor education to customer’s demographic group n Consider providing incentives to shift behavior RECOMMENDATIONS Something you KNOW Something you HAVE Something you ARE
  • 23. 23 A THREE-PRONGED APPROACH C O L L A B O R A T I O N B E T W E E N C O N S U M E R S A N D T E C H C O M P A N I E S Consumers Tech Companies ENLIGHTENED & CONCERNED CONSUMERS HARDWARE & DEVICE MANUFACTURERS AUTHENTICATION SOFTWARE PROVIDERS ACME
  • 24. 24 A THREE-PRONGED APPROACH C O L L A B O R A T I O N B E T W E E N C O N S U M E R S A N D T E C H C O M P A N I E S Consumers Tech Companies ACME Still leaves the problem of entrusting your credentials to a centralized store that could be breached Focused on ways to make “future concepts” a current reality
  • 25. 25 G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S RESOURCES AITE REPORT ON CONSUMER PERSPECTIVES A comprehensive survey of consumer perspectives on authentication and the responses needed by the FI community ADDITIONAL RESEARCH AVAILABLE SOON Follow-on research on the impact false positives have on customer experience
  • 26. Q&A