2023-State-Of-Authentication-Report - OnAuth
2023-State-Of-Authentication-Report - OnAuth
April 2023
Start Report
Contents
Executive Summary 3
Survey Findings
Authentication & Access Management Priorities 9
Current IdPs in Enterprises Today 12
Multiple IdPs Exist for Authentication & Access 13
Management
Executive Summary
SecureAuth’s inaugural State of Authentication report is based on a detailed research survey conducted
independently by ViB Research. The report is based on a survey of 285 IT and security professionals from mid to
large enterprises in North America. It provides insight into the current state of authentication and the latest innovation
adoption trends like invisible MFA, device trust, and passwordless technologies.
• Over half think the technology is susceptible to cyberattacks. Twenty one percent feel traditional MFA cannot be
used as an effective hacker deterrent because adoption rates are too low in operational terms.
• Most respondents have little confidence in using traditional MFAs to thwart credential related cyberattacks. When asked,
“Given that most attacks occur through credentials, how confident are you that traditional MFA is enough to thwart attacks?”
only 5% are very confident with another 40% somewhat confident. Not a strong vote of confidence for traditional MFAs.
• Traditional MFA has users authenticate using verification factors like one-time passwords (OTPs) and personal identification
numbers (PINs) transmitted over SMS text messages, emails or phone calls. While these MFA techniques were considered
revolutionary when they debuted in the late 1990s, they are increasingly viewed as “better than nothing,” but problematic from a
security perspective. Most respondents picked One-Time-Passwords or OTPs with 38% selecting that as one of the methods. The
next most popular passwordless technologies were PINs (27%) and biometrics, which was tied with security keys at 26%.
Given the weaknesses associated with traditional MFAs that are easily exploitable with “MFA bombing”, “man-in-the-middle” and other attacks,
it’s time to kill the traditional MFAs and move on to passwordless technologies that not only enhance security but also provide a much smoother user
experience.
Conclusion
The majority of respondents realize that although traditional MFA is better than nothing, it’s susceptible to cyberattacks and causes too much friction for users.
The only way forward is to move towards a passwordless continuous authentication platform that powers a next generation version of MFA: invisible MFA. This
will enable a strong security posture and Zero Trust Architecture while providing a frictionless user experience.
40%
28% 65%
> 50%
26%
40+25+2312
Demographic Overview Company Size
This report is based on a survey of 285 security and IT professionals working
across a range of industries in North America. Overall, we see an even distribution of
respondents across company size, titles, and industries. 12%
25%
Titles
C-level and VP titles accounted for 21% of the respondents, with 20% being directors. IT
Managers (26%) and Security Managers (28%) rounded out the audience.
40% 23%
15,000+ employees 2,000-4,999 employees
Industry
We had a diverse breakdown of verticals including 20% work in the technology industry, 16% in 25% 12%
healthcare, 13% in manufacturing, and 11% in finance. 5,000-9,999 employees 10,000-14,999 employees
Insurance 6%
Gov (state/local) 4% Director 20%
Utilities 3%
Media 2%
Other 5%
Transportation 2%
EDU K-12 1%
38%
When combined with passwordless technologies, 35% 36%
at 25%, 84% of respondents appear to be looking
29%
Continuous Authentication
beyond traditional authentication technologies in 25%
23%
the near future.
Traditional MFA
Passwordless
Invisible MFA
2%
SSO
2FA
10 State of Identity Report
Workforce and Contractors Lead Authentication Use Cases
Survey respondents use authentication solutions for a range of purposes. Workforce access
management was the top choice, with 80% of respondents saying this was one of their
use cases. Over a quarter use an authentication solution for customer identity and access
management (CIAM), while nearly two thirds put authentication solutions to work managing
access for contractors and vendors.
6%
3%
54% 41% 24% 12%
Microsoft E3 / E5 OKTA Ping Identity SecureAuth / Arculix
7% 6% 3% 13%
ForgeRock Transmit Security HYPR Other(s)
76% of Enterprises Use Multiple IdPs Why do you have multiple IdPs for authentication
and access management?
Some surprising results showed that many enterprises use
multiple IdP products, a trend that bucks the usual consolidation
of cyber security tools. 76% of respondents use more than Specific Use Cases
(i.e. Mac Users) 33%
one IdP in their organization. They reported this redundancy
due to failover, use case requirements, and preferred best of
breed approach reasons. As over 80% of cyberattacks focus
Best of Breed Approach 22%
on credentials, it makes sense that practitioners need to have a
back-up system in case their primary IdP product goes down or is
compromised by an attack. Failover 21%
Majority Have Deployed Traditional MFA What percentage of your organization has deployed
traditional MFA?
Traditional MFA has users authenticate themselves using verification
factors like one-time passwords (OTPs) and personal identification
Over 75%
numbers (PINs) transmitted over SMS text messages, emails or phone
17%
calls. While these MFA techniques were considered revolutionary when 51-75%
they debuted in the late 1990s, they are increasingly viewed as “better
26-50%
than nothing,” but problematic from a security perspective. There have
been enough troubling incidents that IT and security professionals 6-25%
14%
While traditional MFAs are vulnerable, they are better than simple
passwords that are super easy to crack. So, it’s good to see that a lot 3%
Within these respondents, interestingly Insurance companies were the most concerned about weakness of these
methods against hackers, followed closely by Finance, Healthcare, Retail, and Technology companies.
30%
Causes too much user friction
15%
Doesn’t comply with cyber insurance carrier requirements
6%
Other
14%
In terms of passwordless technology, companies Biometrics
are using various different types of technologies for 14%
Security Key
authentication.
14%
PIN
Most respondents picked One-Time-Passwords or 8%
Zero Factor Authentication
OTPs with 38% selecting that as one of the methods.
8%
The next most popular passwordless technologies Other
were PINs (27%) and biometrics, which was tied 7%
SmartCard
with security keys at 26%. Respondents showed a
7%
preference for proven, tangible passwordless solutions Windows Hello for Business
like PINs and OTPs over newer, more subjective 5%
approaches like biometrics and knowledge factors. Knowledge Factors
For respondents, while the vision of using next-gen authentication solution to rid
46%
the world of passwords is appealing, the reality is a bit daunting.
We don’t know enough about passwordless technologies
The survey asked respondents to explain what was standing their way. The top
24% reason was having too many competing priorities (55%), followed by not knowing
We don’t have the budget for passwordless technologies enough about the technology (46%), and lack of budget (24%).
10 Title
18 Stateof Report
of Identity Report
65% Plan on Adopting Passwordless Technologies If you don’t already
in the next 2 Years use passwordless technologies,
what are your plans for adopting them?
It was very encouraging to see that most organizations are planning on implementing
passwordless technologies. Only 15% of the respondents are not ever planning on
adopting passwordless technologies.
33%
Where have your implemented Device Trust Device Trust Woefully Underused to Aid
technologies in your organization? in Credential Attacks
61% To implement an effective continuous authentication process,
All Windows workstations (laptops & desktops) it’s important to have Device Trust on end points. Device trust
technologies track characteristics of a device that are unique to the
40%
user.
All mobile devices
60%
Cyber insurance is a high priority for respondents. Asked, “Is cyber insurance a
priority for you? (i.e., do you need to purchase/renew it for your organization?)” 59%
61%
said “yes.” Only 17% said “no,” while 24% said were “not sure.” This is not a surprising Yes
result. Most businesses are intent on reducing residual cyber risk, and insurance is an
effective way to achieve this outcome. 23%
I’m not sure
However, getting the right kind of cyber insurance coverage, and the best rates, 16%
requires adhering to a range of parameters specified by the carrier. Overall, No
cyber insurance is getting increasingly expensive while providing less coverage.
Organizations that want good coverage and low premiums will need to demonstrate
strong controls over authentication and access. This will almost certainly mean the 61%
adoption of the latest innovative MFA technologies.
If a carrier deems a prospective policy holder to be deficient in its authentication and 16%
access management capabilities, it may deny coverage or insist that the customer
improve its authentication and access management before they will underwrite
the policy. Indeed, some cyber insurance carriers are starting to mandate that
policy holders replace traditional MFA with more advanced and secure techniques, 23%
such as device trust-based invisible MFA, behavioral methods, and passwordless
technologies.
Respondents are precisely screened and targeted from ViB’s community of more
than 10M technology practitioners and decision makers who share their opinions by
engaging in high quality surveys across IT domains including Identity Management.
The Effective Margin of ErrorTM is estimated to be +/- 3.7%. Learn more about ViB’s
research capabilities at
https://vibriefing.news/services/market-research/