Analysing Authentication Challenges & Approaches - FreePint Research
Jinfo Blog
27th August 2015
Abstract
Authentication solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user. Large organisations are coping with situations where they're multiplying those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... Find out more about FreePint's research investigating these challenges and approaches.
Item
If you have questions about authentication, single sign-on systems and related technologies that support content usage, you're not alone. The just-published FreePint Report: Research into Authentication 2015 (subscriber access) analyses responses from nearly 100 information managers on:
- Their organisations' current approaches
- Emerging and urgent concerns and perceptions of the industry on this subject.
Solving an Impossible Problem?
The research also highlights the widespread and growing frustration with how difficult the challenges of authentication are to resolve. Solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user.
Multiply those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... well, you see the problem.
Through the data, and through plenty of discussions with customers at various stages of resolving the authentication challenge, I see that information managers want to work with vendors to find solutions but don't always feel that vendors understand their requirements.
One of the most common calls-to-action amongst information managers is for standards to be established and adhered to. Many comments in the final report suggest this as the next required step for our industry to move forward with authentication.
Read the Full Report
Subscribers can login now to view the full report, or access any of the individual chapters. Also check out the FreePint Webinar, "Authentication Primer: Which Approach Does What?" (10 September; will be recorded), and the Communities of Practice sessions, "Tackling the Authentication Challenge" (15 September and 17 September), for more in-depth and peer-based work on this critical subject.
- Blog post title: Analysing Authentication Challenges & Approaches - FreePint Research
- Link to this page
- View printable version
- Grappling with Authentication and Access in the Pharma Field
Wednesday, 1st July 2015
- All About Usage - from Authentication to Licensing
Tuesday, 4th August 2015
- Research into Authentication 2015
Thursday, 27th August 2015
Contribute to our research into end-user product training:
Learn more
Register for our next Community session:
News and AI - what's next and why pay?
20th March 2025
Latest on our YouTube channel:
Read on the Blog:
March 2025 update
12th March 2025
- March 2025 update
12th March 2025 - What will new outside investment mean for Northern Light?
12th March 2025 - February 2025 Update
12th February 2025
- Jinfo Community session (TBC - May 2025) (Community) 22nd May 2025
- Workforce AI skills (Community) 24th April 2025
- News and AI - what’s next and why pay? (Community) 20th March 2025