How the New COVID-19 Normal Will Accelerate the Shift from Tokens to Digital Certificates

Among the most common methods employed to verify identity are hard and soft tokens. Hard tokens most often take the form of a USB “dongle” or a magnetic swipe card embedded in a badge used to access everything from a local office to a data center containing millions of dollars of IT equipment. Soft tokens are apps that run on a user’s mobile device and provide real-time authentication information. However, both tokens come with serious flaws and disadvantages that have only proven worse over time.

Cybersecurity Live - Boston

In contrast to a traditional hard or soft token, a digital certificate assigns an encrypted identity that is specific to each device. When a certificate-signed device attempts to access the network, the authenticated digital identity cryptographically included in the certificate can verify that this machine has access permissions. This approach eliminates the time and expense problems of hard tokens while also protecting against the security weaknesses inherent in the soft token model.

This complimentary download is offered by Sectigo.
Download Now

Charlene O’Hanlon

Charlene O’Hanlon is Chief Operating Officer at Techstrong Group and Editor at Large at Techstrong Media. She is an award-winning journalist serving the technology sector for 20 years as content director, executive editor and managing editor for numerous technology-focused sites including, CRN, The VAR Guy, ACM Queue and Channel Partners. She is also a frequent speaker at industry events and conferences.

charlene has 44 posts and counting.See all posts by charlene

API Poll

Step 1 of 5

Do you have an API security project in 2022?