Bay Pay Forum’s August Social Mixer was held at UL’s office on Battery Street in San Francisco sponsored by the Transaction Security division of the company.
You are likely familiar with UL (Underwriters Laboratories), they test practically all items being sold in the USA against relevant standards, and their mark is everywhere – on appliances, computer equipment, smoke detectors, life jackets and more. Their job is to protect us by ensuring that products meet certain standards. The Transaction Security division is responsible for any kind of electronic transaction, such implementation of contactless and mobile payments (NFC/HCE/BLE), data security (PCI compliance), and EMV migration - checking for security, compliance, and global interoperability. They are the ones poking at EMV POS devices and the EMV chips to make sure that they are hacker proof! (http://newscience.ul.com/transactionsecurity)
It was a full room, and UL provided a nice spread of refreshments. Too many people present to talk to everyone, I talked to interesting people from Google, RS Sofware, Robert Half, US Trust but I understand that there were people present from other companies (See full list here at the bottom of teh page).
The guest speaker for the event was Pete Donat from First Data Ventures. He and Daniel Chatelain pulled up chairs for a fun, casual “fire-side chat” discussion. Peter is a native of Berkeley, but has lived all over the world, and spent a lot of time on the East Coast. In his college days, he was a “political hack” for Al Gore back when he was campaigning for presidency back in 1988.
Peter first entered the payment space consulting with Marakon Associates. AmEx was one of their clients, and he helped them with their annual planning by building a tool called “SQP” for Strategic Quality Planning, this effort provided him insight into the importance of the payments industry. After that he spent 7 years at MasterCard and another 9 years at Visa in business development.
While at MasterCard Peter had a hand in building the Mondex eCommerce solution (https://www.mastercardconnect.com/mol/molbe/public/login/ebusiness/smart_cards/mondex/about/index.jsp). In 2001 they partnered with Chase to get Mondex working on 14 terminals, the user experience with the POS systems wasn’t the success they’d hope it would be.
Now Peter works for First Data where he is the head of their Venture Unit, where his job is to find small innovative companies, and invest in a selective few that they feel are really have disruptive solutions.
Daniel posed a number of questions, and Peter also fielded a number of questions from the audience. Questions aren’t listed here, but some of the insights that Peter provided are captured below:
Changes in Payments Industry: The elements required to be successful in the payments haven’t changed – like having a critical mass of consumer & network buy-in, and an infrastructure to support the safety of transactions, to manage risk, ensure uptime, handle disputes, etc. - big businesses have spent a lot of time and money building these out. What has changed is the technology, and the pace at which new solutions are introduced. Smaller companies are able to get access to funds and come up with payment solutions in a mere matter of months, but it would take them years to get the same level of infrastructure as the big companies. There needs to be a partnership between the more established companies and these newer disruptive companies.
Wallets: Adoption of using a mobile wallet to replace a physical wallet in the US has been slow. We need to keep working at this, and ensuring that devices can accept the payments.
Bitcoin: It’s all about the merchants – we don’t have many merchants asking for the ability to accept bit coin. Blockchain is the relevant technology for payments and for commerce. First Data has Gyft, a pre-paid product that also supports bit coin, this functionality was already built in when they bought it, so they continue to support it, and can gain learnings from it. There are still many open questions about BitCoin – is it an infrastructure play? Is it a consumer play? Will merchants use it as another network? In order for it to be truly interesting, it has to have sufficient adoption.
NFC: They spent a lot to roll out the technology, but didn’t really see adoption. From the customer’s perspective, the tap vs. swipe experience isn’t compelling enough to make them switch behaviors. However, the ability to link commerce to the phone, where a customer spends much of their time – online, downloading, shopping – there the experience of doing a tap&pay may be easier and quicker than the swipe of the card.
EMV: It works in Europe. When will it take off in the US? EMV has been in planning for a long time. When Peter had been working at MasterCard, he had predicted that EMV would be fully deployed by the end of 2005! That did not manifest. Payment security is part of the EMV solution, but it won’t prevent all fraud, and it won’t stop data breaches. There are “3-legs to the stool” – Encryption, Tokenization, and EMV and it’s surprising how many merchants store data “in the clear” violating the spirit of PCI compliance.
First Data Investments: First data isn’t a perfect organization, they want to invest in new technologies and entrepreneurial companies, but also want to be careful not crush the spirit of what makes them successful. They buy companies like Clover and Gyft, and basically let them function as a stand alone, but work together where they have an infrastructure that supports the acquired company.
Example of disruptive company: First Data can’t invest in all companies that look interesting to them. They have to be selective and pick companies that really stand out. One company they really liked was “Bookers” – they had a solution where you could do a google search for a business (eg. Hair salon, or yoga school) and be able to book the appointment right from the search results page.
Trends in Payments: SKU based solutions – being able to provide item level detail on purchases, API-“ification” taking data from the terminals to use for different solutions
And so ends another great event at Bay Pay Forum. Looking forward to the September 1st event on Bitcoin, Blockchain and Exchanges.
See you there!
One of the main difficulties faced when deploying a multi-factor authentication solution (MFA) is to define the “optimal” form factor. For a given level of security, you would like the solution to be both convenient and universal – that is, to cover as many use cases as possible, for as many users as possible. This is a question we’ve thought about for a long time at inWebo because organizations are so diverse and constantly changing, and we’ve been challenged by our customers to propose future-proofed MFA strategies.
Let’s say for example that the service you’re trying to protect is a federation server managing authorization for both behind-the-firewall and SaaS applications. Depending on who the users are, where they work from, and with which devices they access the applications, you may want MFA to be totally seamless and “tokenless” by leveraging web browsers as authentication credentials keystores. This works best when users always access from the same set of desktops, tablets, or laptops because, although minimal, there’s an initial registration procedure for a browser to be used as a keystore, so it may become cumbersome when users keep changing devices, or impractical if devices are shared or public. Or you may want MFA to leverage smartphones, with contextual and out-of-band authentication requests pushed to the users so that they confirm access. This alleviates the need for registering browsers, hence enabling true mobility. However, this requires all users to be equipped with smartphones, which is a very strong assumption for employee-facing applications as well as for consumer-facing applications.
So, in most real-world deployments, smartphone-based MFA (such as inWebo Authenticator or mAccess) is best for some users – or situations – and tokenless MFA (such as inWebo Helium) is best for the others. Also, that segmentation varies all the time. Indeed, if we’re speaking of employee-facing applications, you probably have the possibility to correlate with which devices you have equipped which users. How cumbersome! And if we’re speaking consumer-facing, you have no clue. Finally, what’s good for today’s applications is probably irrelevant for next year’s.
So no choice appears ideal or future-proofed, hence the dilemma mentioned in the introduction. Should you give up the idea of MFA, scale back to cumbersome and poorly secure SMS-OTP, or make a choice that will leave out users and load the hotline? Hopefully none of these!
Discussing these situations with our early customers, we have designed flexible solutions where authentication connectors (APIs) provide an “always best authenticated” feature: the same user will be given the easiest option to authenticate, tokenless or out-of-band, in any given situation. Our authentication platform works the same way as payment options do for an e-commerce, e.g. accept checks, Paypal, debit and credit cards. If your payment gateway accepts them all, you’re sure not to leave any customer out, but also that customers can choose the method that they have with them or are the most comfortable with for any given transaction. However, you still define policies and may decide that checks aren’t allowed for carts above 500 dollars.
For example, Alice may therefore use her browser token (inWebo Helium) when she connects to her VPN from her tablet, and use her smartphone (inWebo Authenticator) when she connects to her Office 365 account to check her emails from the hotel business center’s desktop. And she can get the new smartphone she’s authorized to every 18 months as per the corporate policy, without ruining your MFA deployment. It’s seamless from Alice’s perspective. It’s also seamless for her company IT admin since he doesn’t need to keep track of the devices she’s equipped with, or to define a static, unique way of authenticating. Your IT admin now has an easier job: he defines authentication policies, which may differ from service to service, or from group of users to group of users. A policy basically lists acceptable authentication methods, that is, the authentication options a user will be proposed, as in the payment options example.
All this is possible because inWebo platform has been designed and built with a multi-device, user-centric approach that abstracts the credential (authentication methods) management.
Try inWebo solutions for free, and talk to us about your authentication challenges!
The odds are that you were first exposed to some form of advanced authentication as an employee when you were given a key-chain token to connect to the company VPN or webmail, or as a customer when you received a code in a short text asking you to confirm a transaction. Although these look like completely different technologies, they have exactly the same single purpose: ensuring with the least possible error that a returning user of a service is the initially enrolled user. If they share the same goal, then why are Enterprise and consumer multi-factor authentication (MFA) so different? Is this going to remain so?
MFA appeared roughly at the same time as remote connections to corporate networks. Paradoxically, although cybercriminals hardly existed, it was inconceivable for large organizations to give access to their IT without some strong form of security, ‘strong’ meaning ‘hardware-based’. Enterprise MFA (at that time a tautology) therefore established itself as a sophisticated but quite expensive technology that equipped a fraction of the staff of large organizations.
In contrast, when the World Wide Web became a mainstream phenomenon and it became possible to pay or to move money online, identity fraud skyrocketed. However, online business was growing even faster, making identity security concerns an important discussion topic – but not yet a market. In 2007, when I started to brainstorm an authentication startup project that later on became inWebo, consumer MFA wasn’t even a concept. Authentication was based on passwords and free.
As the Enterprise MFA market expanded and started to attract more suppliers, differentiation built itself on price. Clones of RSA sprouted. The arrival of feature phones and early smartphones soon disrupted that market, making sound MFA possible without hardware. As a result, solutions improved both in terms of price and convenience (real security was downgraded at the same time, this is the subject of other posts).
Given the opposite starting points of Enterprise and consumer authentication solutions – the latter being free and hardly secure -, consumer MFA initially focused on increasing security but also on keeping costs as low as possible, actually far lower than what Enterprise MFA suppliers were charging. Therefore Enterprise-like solutions weren’t deployed on the new consumer MFA market – with some exceptions here and there. A few inexpensive options, such as printed code cards (TAN) or hidden paths never found adoption since neither brought enough security for the extra costs and friction they introduced. So the first real take-off of consumer authentication was brought with mobile phone generalization that allowed service providers to send one-time codes in short text messages.
A lot of MFA-enabling technologies – such as smartphones, applications stores, html5, push notification frameworks, IaaS and PaaS platforms, but also biometric sensors on smartphones – are now widely available. Like any other software, MFA can therefore now be provided “at no cost” (beyond R&D, QA, operations, marketing & sales, corporate…), since MFA providers no longer need to manufacture and ship hardware devices, or to buy short texts in bulk from carriers and brokers. This allows for more flexible pricing, which now meets most service providers’ very low willingness to pay.
Furthermore, most of IT is now consumerized: employees are consumers to start with, they use web and mobile applications for both professional and personal reasons, most of the time from the same devices. Authentication should be no exception, there’s no obvious reason not to consumerize it too.
So it looks like MFA solutions have reached an “operating point” – consisting of pricing, security level, and friction level – meeting the expectations of both MFA markets, Enterprise and consumer-facing. Are therefore both markets merging?
Branding requirements and corporate culture – yes, culture – are likely to keep the two markets separate for some time still.
It’s totally common and fine to show IT providers to employees, because IT is just a tool for most organizations, not a goal. The IT department’s objectives are no longer (if they ever were?) to develop in-house applications, but to select, integrate, and support the best tools for the business. Let’s say it: it’s now more cool to use well-designed vendor-developed Apps than the usually clunky corporate ones. MFA is no exception here.
In contrast, online providers build their products. Having a customer use a third-party provider to authenticate is not only a culture and branding clash, it’s also – whether or not there are good reasons – considered to trigger trust concerns.
Also, sectorial compliance and regulations faced by service providers in some verticals – in particular those likely to be most needing MFA, such as banking, payment, healthcare – makes it difficult for Enterprise MFA suppliers to enter consumer MFA market segments, in particular with managed solutions running in the Cloud.
Recognizing the convergence of the “operating points” but also the reasons why Enterprise MFA solutions still didn’t fit service providers, inWebo developed an MFA solution. But not only an MFA Solution, inWebo also built an MFA platform.
A platform has no UI (user interface), it has APIs and SDKs (things developers like). Organizations not wanting to develop around an MFA platform use a ready-built MFA solution based on the platform, while service providers (and system integrators) use MFA platforms to build customized and branded MFA solutions, without having to reinvent the wheel. The wheel means in this case, among other things, (1) to dive into cryptography; (2) to integrate all new mobile platforms, OS, and web browsers; (3) to leverage smartphones and other devices’ capabilities as they appear, such as biometric sensors; (4) to design a secure lifecycle authentication credentials; and (5) to support multi-device and multi-service enrollment and recovery. An MFA platform is a fairly heavy and complex wheel.
The MFA platform approach – pioneered by inWebo in 2011 – is therefore removing the distinctions between consumer and Enterprise MFA and blurring the frontiers between both markets.
The time of the Business of Identity has arrived. From an obscure technical topic a couple of years ago, Identity and Access Management (IAM) has gained visibility from CIOs and other C-level executives. Since IT has become central both as a tool for employees and as a way to build and to provide services, IAM aims at organizing interactions with employees, as well as customers. IAM brings a user-centric approach – and therefore more agility and efficiency – to the delivery and orchestration of services, both for internal and external users.
IAM projects are also an opportunity to improve compliance and security. The former, because they allow an increased visibility by organizations on access rights, helping determine who did what when, in particular when something went wrong. The latter, because they are a way to enforce security policies, define who should have access to what when, and how a person accessing a service proves she’s an authorized user.
IAM is indeed about processes, compliance, and security at the same time. Whichever was the reason that first triggered an IAM project within an organization, the two others should be included in the same project. So, let’s say you’re a system integrator helping organizations revamp their IAM. How will you make it happen on all 3 aspects? To start with, should you really address these 3 aspects? If so, how many vendors should you talk to?
Let’s focus on security. Identity security is provided by authentication. The good news is that the roles and interfaces between IAM solutions and authentication solutions are clearly defined. Schematically, an IAM solution acts as a provisioning and authorization server, while an authentication solution enforces access security policies. Both talk with each other using standard protocols, for authentication as well as provisioning. Most IAM vendors have integrations with most MFA (multi-factor authentication) vendors, and vice versa. At this point though, native MFA options proposed by IAM vendors are rather limited (the symmetric is also true), so you might have to consider specialized vendors for each component.
Authentication is a key component of IAM projects, and MFA vendors are well integrated – if not ‘OEMed’ – with IAM vendors. All this should encourage system integrators doing service around IAM solutions to also have MFA in their service portfolio, in order to cover the complete scope of IAM projects.
If you recognize it too, why is inWebo a partner of choice to provide MFA? First, for their product, which meets and exceeds most customer expectations, be it for its security level, its ease of use, or the vast number of real-world use cases it supports. You’ll also have a direct access to our Product and R&D teams, and we make sure to keep some capacity for customer projects in our next development sprints. Second, for their expertise and dedication to support you in marketing, selling, and delivering security projects. Third, for their commitment to the channel and partnership model.
See inWebo as a way to broaden your service portfolio. Our Partner team is there to help you generate more business.