The increasing proliferation of authentication methods makes it necessary to establish a trust anchor for the various access methodologies. It is becoming increasingly hazardous to continue using some authentication methods without checking the trust anchor, especially when some authentication methods may not be convenient for users and some applications may not be able to address it. Organisations need to be mindful that malicious intruders may have substantial resources and IT competence when deploying their attacks. Large organisations are high-value targets and need to protect themselves against highly professional attacks.
This whitepaper looks at the methods used to prove users are genuine and that organisations can trust in their credentials. The role of a good anchor of trust can enhance security and give organisations reassurance in the knowledge that every measure is being taken to mitigate unauthorised access.