SHARE
Facebook X Pinterest WhatsApp

Beyond Passwords: Seeking Authentication Options

Password problems Beyond Passwords: Seeking Authentication Options IT security professionals, ready to move beyond traditional passwords, are interested in authentication alternatives, a new study suggests. Plans to Increase IT Security Budget While 95% said they will increase IT security spending this year, 44% said that increase would be more than 20%. Number of Breaches in […]

Written By
thumbnail Michael Vizard
Michael Vizard
Jan 19, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Password problems

1 - Beyond Passwords: Seeking Authentication OptionsBeyond Passwords: Seeking Authentication Options

IT security professionals, ready to move beyond traditional passwords, are interested in authentication alternatives, a new study suggests.

2 - Plans to Increase IT Security BudgetPlans to Increase IT Security Budget

While 95% said they will increase IT security spending this year, 44% said that increase would be more than 20%.

3 - Number of Breaches in Last 12 MonthsNumber of Breaches in Last 12 Months

59% report they have had at least one breach, and 24% report they’ve had several.

4 - Measuring Impact of Security BreachMeasuring Impact of Security Breach

62% said it costs more to deal with the consequences of an IT security breach than it does to protect data in the first place.

5 - How Often Employees Contact Help Desk About Forgetting PasswordsHow Often Employees Contact Help Desk About Forgetting Passwords

Nearly all report having to deal with this issue, with 37% reporting this happens all the time inside their organizations.

6 - The Coming of Password ObsolescenceThe Coming of Password Obsolescence

A full 91% expect to see that occur within the next 10 years, with 51% strongly agreeing.

7 - Use of Other Methods of AuthenticationUse of Other Methods of Authentication

66% report that their organizations are already using additional methods of authentication internally.

8 - Reliability of New Authentication MechanismsReliability of New Authentication Mechanisms

A full 97% said new approaches to authentication are reliable, with 53% saying they are very reliable.

9 - The Most Reliable Authentication TechnologiesThe Most Reliable Authentication Technologies

Biometrics tops the list, at 34%, followed by two-factor authentication, at 28%.

10 - Security TradeoffsSecurity Tradeoffs

87% said they have been forced to compromise between IT security and user experience, with 29% reporting this happens all the time.

11 - The Challenge With New Authentication TechnologiesThe Challenge With New Authentication Technologies

81% said new technologies can be prohibitive for them to acquire and implement, but only 31% strongly agreed with that sentiment.

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.