Analysing Authentication Challenges & Approaches - FreePint Research
Jinfo Blog
27th August 2015
Abstract
Authentication solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user. Large organisations are coping with situations where they're multiplying those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... Find out more about FreePint's research investigating these challenges and approaches.
Item
If you have questions about authentication, single sign-on systems and related technologies that support content usage, you're not alone. The just-published FreePint Report: Research into Authentication 2015 (subscriber access) analyses responses from nearly 100 information managers on:
- Their organisations' current approaches
- Emerging and urgent concerns and perceptions of the industry on this subject.
Solving an Impossible Problem?
The research also highlights the widespread and growing frustration with how difficult the challenges of authentication are to resolve. Solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user.
Multiply those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... well, you see the problem.
Through the data, and through plenty of discussions with customers at various stages of resolving the authentication challenge, I see that information managers want to work with vendors to find solutions but don't always feel that vendors understand their requirements.
One of the most common calls-to-action amongst information managers is for standards to be established and adhered to. Many comments in the final report suggest this as the next required step for our industry to move forward with authentication.
Read the Full Report
Subscribers can login now to view the full report, or access any of the individual chapters. Also check out the FreePint Webinar, "Authentication Primer: Which Approach Does What?" (10 September; will be recorded), and the Communities of Practice sessions, "Tackling the Authentication Challenge" (15 September and 17 September), for more in-depth and peer-based work on this critical subject.
- Blog post title: Analysing Authentication Challenges & Approaches - FreePint Research
- Link to this page
- View printable version
- Grappling with Authentication and Access in the Pharma Field
Wednesday, 1st July 2015
- All About Usage - from Authentication to Licensing
Tuesday, 4th August 2015
- Research into Authentication 2015
Thursday, 27th August 2015
Community session
11th December 2024
2025 strategic planning; evaluating research reports; The Financial Times, news and AI
5th November 2024
How are information managers getting involved with AI? Navigating privacy, ethics, and intellectual property
- 2025 strategic planning; evaluating research reports; The Financial Times, news and AI
5th November 2024 - All recent Jinfo Subscription content
31st October 2024 - End-user training best practice research
24th October 2024
- Jinfo Community session (TBC) (Community) 23rd January 2025
- Clinic on contracting for AI (Community) 11th December 2024
- Discussing news and AI strategies with the Financial Times (Community) 21st November 2024