Special Report: Transform User Authentication
Get the Gartner research report and learn how to balance secure, resilient identity corroboration and a great customer experience
Expanding the scope of identity proofing.
By 2023, identity corroboration hubs will displace existing authentication platforms in more than 50% of large and global enterprises, up from less than 5% today.
Digital business initiatives create tension between secure, resilient identity corroboration and great user/customer experience. Modern enterprises need to identify all use cases where there’s a need to corroborate the identities of strangers (i.e., people previously unknown to the enterprise) or of familiar people (i.e., those already known). Companies should explore the potential value of identity proofing techniques as an alternative to orthodox authentication methods for trust elevation within an adaptive approach.
Download your copy of the Gartner report and learn how identity proofing can be used for the life of an online account, not just for new account creation.
What You'll Learn
Why credential-based authentication methods tend to degrade user/customer experience and can be costly to provision and administer
How to use Gartner’s TICM (Trusted Identity Corroboration Model) to identify needs and select tools to support different use cases
The potential value of identity proofing techniques as an alternative to orthodox authentication methods for trust elevation
Identity proofing is bleeding into authentication use cases
While authentication cannot be used to corroborate the identity of a stranger, identity proofing tools can certainly be used to corroborate the identity of someone already known. Gartner is witnessing greater use of identity proofing methods for traditional logins, continuous authentication, trust elevation (e.g., step-up authentication) and identity recovery use cases.
Complete the form on this page for instant access to this valuable research.