Two-Factor Authentication Goes Mobile
Two-Factor Authentication Goes Mobile
GOES MOBILE
First Edition September 2012 Whilst information, advice or comment is believed to be correct at
Goode Intelligence time of publication, the publisher cannot accept any responsibility
All Rights Reserved for its completeness or accuracy. Accordingly, the publisher,
author, or distributor shall not be liable to any person or entity
Published by: with respect to any loss or damage caused or alleged to be caused
Goode Intelligence directly or indirectly by what is contained in or left out of this
26 Dover Street publication.
London
W1S 4LY All rights reserved. No part of this publication may be reproduced,
United Kingdom stored in a retrieval system or transmitted in any form or by any
Tel: +44.20.33564886 means, electrical, mechanical, photocopying and recording without
Fax: +44.20.33564886 the written permission of Goode Intelligence.
www.goodeintelligence.com
info@goodeintelligence.com
CONTENTS
Its all about user choice! Self-management the key to 2FA lifecycle management ............ 4
More mobile phones than people every phone can support tokenless 2FA ........................ 5
Tokenless Mobile 2FA Market Activity: Increasing sales erode hardware token market ... 10
Summary ............................................................................................................................ 11
The mobile phone has become the de-facto device for business Goode
and leisure and is in the hands of the majority of the worlds Intelligence
population. Mobile phones have become the dominant computing White Paper
platform for every part of our daily lives including communication
(including business email), social networking, gaming, media Goode Intelligences
consumption, navigation and even payment with the advent of white papers offer
Near Field Communications (NFC) technology. The mobile phone analyst insight from
is the ultimate disruptive technology and authentication is not research extracted
from primary
immune from its influence.
sources including
surveys, analyst
MARKET ANALYSIS: THE MOBILE PHONE AS reports, interviews
ULTIMATE TOKENLESS AUTHENTICATOR and conferences.
1
Taken from mSecurity Survey 2011 Report premium edition, published by Goode intelligence April 2012:
http://www.goodeintelligence.com/report-store/view/gi-msecurity-2011-survey-report-premium-edition
2
Goode Intelligence primary research
3
Taken from The mobile phone as an authentication device 2010-2014. Published by Goode Intelligence, November 2009:
http://www.goodeintelligence.com/report-store/view/the-mobile-phone-as-an-authentication-device
The choice for an employee to bring in their own personal device to the workplace and use it
for business purposes; where device can mean smart phone, tablet computer, netbook,
laptop or MacBook.
The choice to share information with friends and colleagues using agile cloud-based
services such as Dropbox and Box.
The choice to communicate with friends and colleagues using social network tools such as
Facebook, Twitter and LinkedIn.
Will bring your device (BYOD) turn into bring your own token (BYOT)? Over two-thirds
of organisations now support BYOD and many are using tools such as Mobile Device
4
Management (MDM) to enforce security policy. These employee-owned devices are also being
utilised as authenticators; soft tokens running as mobile apps Bring your own token (BYOT)
Are we able to put the user in control whilst at the same time ensuring that information
security policy is met? GI firmly believes that the two can coexist with each other for 2FA
solutions by:
1. Choosing an authentication technology partner that puts the user in control but also
allows authentication security policy to be met
2. Allows administrators to create the technology framework to support choice
3. Allows the end user to choose the authentication device of choice
4. Supports any mobile phone, not just smart phones that can run mobile apps
5. Allows the user to swap seamlessly between mobile phones without incurring
additional license cost
It is forecast that shortly there will be more mobile devices than people on this planet
(forecast for just over seven billion people in 2012)5. Ericsson, the mobile network
technology vendor, forecasts that by 2017 there will be nine billion mobile phone
subscriptions.6
Forecasts for 2011 indicated that there were around six billion mobile phone subscribers
around the world with predictions that this figure would rise by 500 million, to a total of 6.5
billion, by the close of 2012.7
Late delivery of an OTP contained in an SMS text message can be problematic for a time-
critical login that can mean no access to critical enterprise resources. To overcome this
tokenless 2FA vendor, SecurEnvoy, has developed a patented pre-loading feature where
5
United Nations world population figures
6
Ericsson: http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#subscribers Please note that this forecast is
for subscriptions. One mobile phone subscriber can have multiple mobile phone subscriptions.
7
http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#subscribers
the problem of poor mobile phone network coverage is removed by the ability to pre-load
OTPs.
Pre-loaded one time codes are an innovation from SecurEnvoy that gets over the
problem of guaranteeing the receipt of SMS text messages. There are situations, e.g.
peak-times for SMS traffic or when a mobile phone user is outside of network
coverage, when an SMS text message cannot be delivered to a user within a timely
manner. This can be critical if you are using SMS to deliver an OTP for remote
network access. By pre-loading one time authentication codes each time (three codes
are sent with each SMS text message) a user initiates a logon session this issue is
resolved
Innovate or fail!
There are many examples in the history of information technology where market-dominant
technology vendors have seen a steep-decline in fortunes as a result of a failure to keep
innovating. The IT and telecommunications graveyard is full of organisations that, instead of
keeping innovation central to their strategy, have relied on technology that may have been
disruptive and innovative in a previous IT age. The current problems that technology vendors
such as Research In Motion (RIM) and Nokia are facing testify that companies must strive to
innovate and successfully get that innovation to market.
The mantra of innovate or fail is as true in the world of information security and
authentication as it is with other areas of IT and telecommunications. One authentication
vendor that views innovation as key to its success is SecurEnvoy.
Future product releases will build on this strong track record in innovation and will include
solutions to use one time codes to session lock the voice network to the browsers current
network connection for phone call-based authentication.
We are witnessing diverse and fundamental changes in how enterprise IT is accessed and
consumed. A combination of smarter connected consumer devices and cloud-based
enterprise services is leading to a revolution in how employees access enterprise IT
resources.
Company-issued laptop computers have been the de-facto endpoint computer device for
accessing enterprise IT resources when away from the office. Laptop computers are
equipped with serial and USB ports that allow devices, such as smart card readers and USB
memory sticks, to be easily attached and used. Smart cards and USB-based authenticators
have been methods in which 2FA has been supported. However, as falling laptop sales
testify, the laptop is losing its grip on being the prime enterprise mobile computing device.
In recent years the trend has been to complement, and even replace, enterprise laptop use
with a new breed of smart connected devices. Commonly these new smart mobile devices
(SMDs) are smart phones and tablet computers running mobile operating systems.
Additionally the enterprise is been extended out to a new range of connected intelligent
consumer devices that offer similar levels of functionality as smart phones and tablet
computers. It is feasible that access to enterprise resources could well be pushed out to
Smart TVs, games consoles and other touch-screen consumer devices.
These are consumer devices and, in the main, do not offer the same levels of local
connectivity that a laptop computer does. If an organisation has adopted hardware-based a
2FA solution that requires either a physical connection, certificate or pre-installed software
on an enterprise owned device than this investment would be redundant in this new age.
As a result of this change, organisations should embrace 2FA technology solutions that have
a zero footprint at the point of authentication; thus accommodating both existing connection
points on any present or future device. This approach is more in-tune with the changing
nature of enterprise IT. Goode Intelligence believes that tokenless mobile 2FA currently
offers the best solution to provide strong authentication for the new breed of remote
enterprise workers.
Historically, each of three businesses was run independently, including its IT infrastructure
services. To streamline its operation, Invensys introduced a global IT infrastructure division
with a remit of developing shared IT services across all three of the business units. This
included remote access services with a vision of creating a single solution to support
employees accessing Invensys IT resources remotely. Naturally, user authentication is a
vital part of this shared infrastructure.
problems; despite being run as an outsourced service Invensys Rail found it to be time
consuming and costly to operate. One key issue was availability of the hardware token when
end-users really needed it. Users were often without their tokens when they were required to
connect to the Invensys Rail IT network remotely.
A decision was made to replace the hardware token solution with the key project drivers
being:
1. To reduce the cost of the current hardware token 2FA solution; calculated as $8 per
person per month for hardware token.
2. To reduce the time it took to deliver 2FA credentials to users; calculated as taking
around ten days.
The task was given to David van Rooyen, principal solutions architect, responsible for
Invensys telecommunication based infrastructure strategy. After developing the
requirements and evaluating the technology available, Van Rooyen decided to deploy a
mobile phone-based 2FA solution provided by SecurEnvoy - SecurAccess. Van Rooyen
outlined how the SecurEnvoy solution fulfilled Invensys requirements for an agile cost
effective 2FA solution; Provisioning a physical token for one of our users takes around ten
days compared with five minutes provisioning a soft token, so the man hours are vastly
reduced as well as the costs of shipping them out. Ive completed a full business analysis
and found that $8 per person per month is what it was costing for a physical token versus $2
per person per month for a soft token. When you replicate that across 15-20,000 users, the
savings are in the millions.
Table 1: Key benefits: Hardware token vs. Tokenless - Cost reduction and Time saving
Goode Intelligence is a leading authority in mobile security and has been covering the
mobile phone-based authentication market since 2009 when it first published its report The
mobile phone as an authentication device. Since that report was published GI has noticed
the steady rise in the adoption of mobile phone-based authentication solutions.
Figure 2: The percentage of organisations that have adopted the mobile phone as an
authentication device 2009-2011
35%
22%
0%
2009
2010
2011
In 2010, data harvested from end-users and technology vendors, suggested that around five
percent of global 2FA sales were mobile-based. A follow-up study in 2012 discovered that
this figure was now over 20 percent. A forecast, made by GI in 2009, suggested that by the
end of 2014, 64 percent of 2FA sales will be mobile.8
8
Taken from The mobile phone as an authentication device 2010-2014. Published by Goode Intelligence, November 2009
SUMMARY
Mobile phones offer organisations that are evaluating their end-user authentication strategy
a realistic alternative to both single-factor, userid/password, and hardware-based (single-
user devices) two-factor authentication solutions.
This white paper has explored how mobile 2FA is meeting the needs of modern IT functions
that require agile, cost-effective and easy to deploy/manage two-factor authentication
solutions.
The market for mobile 2FA will continue to grow and it is on course to become the dominant
force in two-factor authentication.
End-users who are reviewing their authentication strategy must seriously consider mobile
2FA as a viable solution.
End-users should ask potential authentication partners these important questions when
evaluating a suitable 2FA technology solution:
Does the solution offer an end-user choice in what mobile phone they can use for
2FA purposes?
Can the end-user make these choices through a self-management function?
Does the mobile 2FA solution work on any phone, in any region and any time?
If the solution is SMS-based, how is the problem of delayed SMS delivery and poor
network coverage resolved?
How easy is it to re-provision an end-user when that user changes their mobile
phone and is there any additional cost involved in this process?
What track record does the potential technology partner have for innovation and will
innovation continue to be important for future product releases?
Should allow 2FA on any device allowing zero footprint at the point of login
Mobile Phone Biometric Security Analysis and Forecasts 2011-2015 (Published June 2011)
Mobile Financial Services (MFS) Series - Insight Report: Mobile Banking Security (Planned
publication October 2012)
Smart Mobile Identity the next wave of mobile identity and authentication solutions
(Planned publication December 2012)
For more information on this or any other research please visit www.goodeintelligence.com.
Since being founded by Alan Goode in 2009, Goode Intelligence has built up a strong
reputation for providing quality research and consultancy services in mobile security. This
document is the copyright of Goode Intelligence and may not be reproduced, distributed,
archived, or transmitted in any form or by any means without prior written consent by Goode
Intelligence.