Strong au<strong>the</strong>nticationthat it is ab<strong>so</strong>lutely essential that this kind ofinformation remains well protected.The answer to security challenges createdby <strong>the</strong> increased use of <strong>wireless</strong> technologyis strong au<strong>the</strong>ntication. The use of strongau<strong>the</strong>ntication or two-factor au<strong>the</strong>ntication<strong>so</strong>lutions allows identifying <strong>the</strong> per<strong>so</strong>n tryingto access a corporate network or application,allowing only authorized users and keepingall <strong>the</strong> o<strong>the</strong>r ones out. The principle of strongau<strong>the</strong>ntication is quite simple. Classic logonmethods usually require only a usernameand a password to gain access to a networkor application. Strong au<strong>the</strong>ntication alwaysrequires more than one factor to log on,which is why it is al<strong>so</strong> called two-factorau<strong>the</strong>ntication. Usually, it is a combinationof <strong>so</strong>mething you know, like a password ora PIN-code, and <strong>so</strong>mething you have, forinstance a smart card or an au<strong>the</strong>nticationdevice. Most people are actually alreadyfamiliar with <strong>the</strong> principle of two-factorau<strong>the</strong>ntication, without being aware of it.For instance, when you need to withdrawcash from an ATM, you use your bankcard(<strong>so</strong>mething you have) and your PIN-code(<strong>so</strong>mething you know). Suppose your bankcard gets stolen, <strong>the</strong> thief would still needyour code to gain access to your bankaccount. And if anyone was able to gues<strong>so</strong>r to intercept your PIN, <strong>the</strong>y would stillneed your bank card. It is obvious that <strong>the</strong>combination of <strong>the</strong> two factors ensures amuch higher level of security than <strong>the</strong> use ofonly one factor.The same principle can be applied inenterprise security. Today’s enterprises oftendeal with similar au<strong>the</strong>ntication challenges,such as securing remote access. Remoteaccess to company networks and applicationsgoes hand in hand with <strong>the</strong> increased use oflaptops and o<strong>the</strong>r mobile devices, and offersmany advantages. Today’s employees workfrom home, or on <strong>the</strong> road. Enterprises thatare operating worldwide hire employees allover <strong>the</strong> world, allowing <strong>the</strong>m to work fromremote home offices while still being ableto access all <strong>the</strong> necessary applications. But<strong>the</strong>y need to ensure that only authorized usersare able to gain access to important data andcorporate information; remote access needsto be effectively secured. If remote access i<strong>so</strong>nly secured with a weak static password, it<strong>becomes</strong> easy for fraudsters to intercept orsimply to guess <strong>the</strong> password.Most people tend to use easy to rememberpasswords, such as <strong>the</strong>ir pet’s name or <strong>the</strong>irchildren’s birthday. This kind of informationcan be easily obtained, for instance from<strong>so</strong>cial network websites such as Facebook.Imposing a strict password policy rarelyhelps, as complex passwords and regularpassword changes tend to be confusing formany employees. This often results in <strong>the</strong>writing down of passwords, which is ofcourse all but helpful in improving security.Strong au<strong>the</strong>ntication drastically increases<strong>the</strong> security level of remote access <strong>so</strong>lutions.Au<strong>the</strong>ntication devices are able to generate<strong>so</strong> called dynamic or one-time passwords(OTPs), which replace <strong>the</strong> use of staticpasswords. Dynamic passwords are valid fora limited amount of time and can be usedonly once. This means that even if a fraudsterwas able to intercept a password, <strong>the</strong>y wouldnot be able to use it again. The employee i<strong>so</strong>nly able to log on using <strong>so</strong>mething <strong>the</strong>yknow, for instance a username or a PINcode,and <strong>so</strong>mething <strong>the</strong>y own, meaning <strong>the</strong>au<strong>the</strong>nticator used to generate <strong>the</strong> dynamicpassword. This <strong>so</strong>lution is not only veryeffective, protecting <strong>the</strong> corporate re<strong>so</strong>urcesfrom unauthorized access, but al<strong>so</strong> veryuser friendly, as it <strong>becomes</strong> unnecessary toremember complex passwords or change<strong>the</strong>m on a regular basis.Strong au<strong>the</strong>ntication can be used not onlyto secure remote access, but al<strong>so</strong> all o<strong>the</strong>rcorporate applications. One of today’s ICTtrends is Software as a Service (SaaS), <strong>the</strong>use of web-based company applicationshosted on external platforms. This trendal<strong>so</strong> goes hand in hand with <strong>the</strong> flourishingof <strong>wireless</strong> technology, as you only needan Internet connection to be able to accessyour company’s web-based applications.Having a laptop or a netbook, employeescan work with <strong>the</strong>se applications anywhereand anytime. The principle of strong twofactorau<strong>the</strong>ntication can be applied here aswell. Employees will use an au<strong>the</strong>nticatorto generate a one-time password and log insafely, ensuring that only authorized usersgain access to <strong>the</strong> application.One of <strong>the</strong> big advantages of strongau<strong>the</strong>ntication devices is that <strong>the</strong>y can take<strong>the</strong> form of hardware as well as <strong>so</strong>ftwareau<strong>the</strong>nticators. Hardware au<strong>the</strong>nticators areusually little devices, which can be carriedaround easily in a pocket, a purse or even ona key ring. Software au<strong>the</strong>nticators al<strong>so</strong> comein different forms and can be installed on <strong>the</strong>user’s computers, laptops and even mobilephones. In <strong>the</strong> context of <strong>the</strong> increasing use of<strong>wireless</strong> technology, this is a very importantfeature. Employees already equipped withlaptops, smartphones or even regular mobilephones, can use <strong>the</strong>se mobile devices toimplement an au<strong>the</strong>ntication <strong>so</strong>lution. Thisway, <strong>the</strong> same tools used to benefit from<strong>the</strong> advantages of <strong>wireless</strong> technology al<strong>so</strong>become <strong>the</strong> carriers of <strong>the</strong> au<strong>the</strong>ntication<strong>so</strong>lutions used to secure access to corporatenetworks and applications.In today’s enterprise context, <strong>wireless</strong><strong>so</strong>lutions offer many advantages. Bo<strong>the</strong>mployees and companies benefit from <strong>the</strong>increased mobility and flexibility. Employeesare able to work anywhere at anytime,allowing better time management and a betterbalance between work and private life. Thecompany can manage <strong>the</strong> communication andinformation flow more effectively, keepingeveryone constantly up to date. But <strong>wireless</strong>technology al<strong>so</strong> brings along an increasedrisk of possible identity <strong>the</strong>ft and abuse, andneeds to be effectively secured before it canbe turned into a strategic advantage. Strongau<strong>the</strong>ntication drastically decreases <strong>the</strong> riskof password abuse and allows employeesand companies to fully benefit from <strong>the</strong>opportunities offered by <strong>the</strong> increasing use of<strong>wireless</strong> technology. •14 • North America 2010
The three Mobile states payment Mobile of broadband systemsaccessBroadband is like water for thirsty enterprisesby Danny Bowman, President, Integrated Solutions Group, Sprint NextelThe introduction of high-speed broadband over <strong>wireless</strong> connections enables true ‘everything<strong>wireless</strong>’ubiquity. For enterprises this turns emerging <strong>wireless</strong> technology into a powerfulagent for change, enabling capabilities that can have a transformative effect on operations,cost structure and market-making strategy.Danny Bowman is President of Sprint Nextel’s Integrated Solutions Group (ISG). Mr Bowman served as President - iDEN from June2008 to August 2009 and has served in various executive positions including Product Development and Management, Sales, Marketing,and General Management since 1997.Danny Bowman is a graduate of Evangel College in Springfield, Mis<strong>so</strong>uri, and holds a degree in Business Management. He al<strong>so</strong> holds aLeadership Certificate from <strong>the</strong> McDonough School of Business at Georgetown University in Washington, DC.Sea<strong>so</strong>ned executives know all too well thatmarket forces never cease driving companiesto become more competitive. However <strong>the</strong>past couple of years have brought an unusuallysevere test - with a drought in both demand andcapital that has challenged enterprises in everyindustry sector. Whe<strong>the</strong>r economic recoverycomes slowly or quickly, companies are in needof relief, and many will find significant supportfrom what could be an unexpected <strong>so</strong>urce.That <strong>so</strong>urce has been described in many ways,but perhaps most succinctly by <strong>Connect</strong>-<strong>World</strong>’s term, <strong>the</strong> ‘everything-<strong>wireless</strong> world’.While an ‘everything-<strong>wireless</strong>’ environmentcertainly won’t <strong>so</strong>lve <strong>the</strong> global problems ofdemand creation and investment, it wouldbe a mistake to underestimate its impact onindividual companies as <strong>the</strong>y manage throughthose challenges. Enterprises are in factdiscovering what a powerful change agent<strong>wireless</strong> can be. The primary driver is foundin <strong>the</strong> one characteristic of emerging <strong>wireless</strong>technology which enables true ‘everything<strong>wireless</strong>’ubiquity - <strong>the</strong> advent of high-speedbroadband over <strong>wireless</strong> connections.<strong>As</strong> we have seen with Sprint’s introductionof 4G in <strong>the</strong> United States, high-bandwidthconnectivity that was once available only in afixed wireline form is beginning to ripple out<strong>wireless</strong>ly to embrace mobile <strong>workforce</strong>s andmany more assets. Corporate managers arelearning to think of broadband as more thanmere efficiency-expanding speed. In fact, it hasfar-reaching implications, enabling capabilitiesthat can have a transformative effect onoperations, cost structure and market-makingstrategy itself.Put simply, broadband is like water for thirstyenterprises. At one level, enterprises thirst forways to streamline operations and increaseproductivity. Beyond this, companies need tocreate more product value from scarce capital,while generating a faster return on investment.Whatever <strong>the</strong> need, <strong>the</strong> thirst-slaking ‘water’of broadband is nothing less than a vital lifesustainingelement for enterprise today.Yet as indispensable as broadband now is,<strong>the</strong> process of applying broadband’s variedmanifestations in <strong>the</strong> commercial environmentremains in its infancy. To understand why this is<strong>the</strong> case, it is helpful to consider how broadbandis taking on different forms as it drives <strong>the</strong>evolution to everything-<strong>wireless</strong>.The three states of broadbandLike water itself, we can think of broadband asexisting in three potential forms:- where water can be <strong>so</strong>lid ice, broadbandconnections can be fixed in particularlocations;- where water can be fluid, broadband canbe mobile, flowing seamlessly from oneplace to ano<strong>the</strong>r;- where water can be diffused into <strong>the</strong>very atmosphere itself, broadband canthoroughly permeate our work andlifestyles through a vast network ofdispersed electronic devices, both fixedand mobile.Each of <strong>the</strong>se broadband states progressivelycontains, and releases, a higher level ofpurposeful human energy. Considered thisway, we can see that broadband is evolvingfrom a nuts-and-bolts necessity for busines<strong>so</strong>perations into a highly dynamic, shape-shiftingphenomenon that can significantly influencestrategic approaches across multiple industries.<strong>As</strong> we will see, it is already doing just that.Broadband’s impact on businesses is abundantat every stage of its development, beginningwith its fixed wireline form.Enterprises have long designed <strong>the</strong>ir ITinfrastructures around fixed broadband. Since<strong>the</strong> number of Internet hosts worldwide firstsurpassed 10,000 in 1987, <strong>the</strong> use of carrier-North America 2010 • 15