TY - JOUR T1 - Multifactor Authentication: Its Time Has Come JF - Technology Innovation Management Review Y1 - 2013 A1 - Jim Reno KW - authentication attacks KW - authentication mechanisms KW - multifactor authentication KW - online security AB - Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience. PB - Talent First Network CY - Ottawa VL - 3 UR - http://timreview.ca/article/716 IS - 8 U1 - CA Technologies Jim Reno is a Distinguished Engineer and Chief Architect for Security at CA Technologies. He joined CA with the Arcot acquisition in October 2010. At Arcot, Jim led the development of strong authentication and risk management systems. He has more than 30 years’ experience in software development, working on operating systems, databases, networking, systems management, and security. Jim is one of the inventors of the 3-D Secure protocol used in the Verified by Visa and MasterCard SecureCode programs. He holds multiple patents in the area of credit card verification and authentication. At CA he guides the overall architecture of CA’s security products as well as security aspects of the entire CA portfolio. ER -