Analysing Authentication Challenges & Approaches - FreePint Research
Jinfo Blog
27th August 2015
Abstract
Authentication solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user. Large organisations are coping with situations where they're multiplying those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... Find out more about FreePint's research investigating these challenges and approaches.
Item
If you have questions about authentication, single sign-on systems and related technologies that support content usage, you're not alone. The just-published FreePint Report: Research into Authentication 2015 (subscriber access) analyses responses from nearly 100 information managers on:
- Their organisations' current approaches
- Emerging and urgent concerns and perceptions of the industry on this subject.
Solving an Impossible Problem?
The research also highlights the widespread and growing frustration with how difficult the challenges of authentication are to resolve. Solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user.
Multiply those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... well, you see the problem.
Through the data, and through plenty of discussions with customers at various stages of resolving the authentication challenge, I see that information managers want to work with vendors to find solutions but don't always feel that vendors understand their requirements.
One of the most common calls-to-action amongst information managers is for standards to be established and adhered to. Many comments in the final report suggest this as the next required step for our industry to move forward with authentication.
Read the Full Report
Subscribers can login now to view the full report, or access any of the individual chapters. Also check out the FreePint Webinar, "Authentication Primer: Which Approach Does What?" (10 September; will be recorded), and the Communities of Practice sessions, "Tackling the Authentication Challenge" (15 September and 17 September), for more in-depth and peer-based work on this critical subject.
- Blog post title: Analysing Authentication Challenges & Approaches - FreePint Research
- Link to this page
- View printable version
- Grappling with Authentication and Access in the Pharma Field
Wednesday, 1st July 2015
- All About Usage - from Authentication to Licensing
Tuesday, 4th August 2015
- Research into Authentication 2015
Thursday, 27th August 2015
From information retrieval to integrated intelligence - with Dow Jones
23rd January 2025
AI contracting and licensing; Strategic information managers; End-user training
10th December 2024
- Jinfo Community session (TBC - Mar 2025) (Community) 20th March 2025
- Jinfo Community session (TBC - Feb 2025) (Community) 25th February 2025
- From information retrieval to integrated intelligence - with Dow Jones (Community) 23rd January 2025