Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesAccess Management

From books to biometrics: Jeff Bezos’ lasting footprint on security

By Ben Goodman
behavioral data for access management
June 23, 2021

When Jeff Bezos announced his plan to step down as Amazon’s CEO, tech leaders across the world paused to reflect not only the impact Bezos made on e-commerce, but also on technology and the e-commerce industry at large. Amazon has set the standard for user experiences and redefined consumer expectations, most notably through reimaging delivery and cost savings strategies through price comparison tools and subscription-based services. Perhaps less obvious, but just as important, is the superior customer experience Amazon has built around customer identity by making it nearly invisible to consumers, all without compromising security. 

How Amazon set the standard in e-commerce for consumers 

Online and mobile shopping have been transformed by Amazon in myriad ways. First, the user experience is completely intuitive, easy-to-use, and seamless. Amazon rarely asks users to re-enter their passwords before making a purchase, and it even offers a “buy now” button for an express buyer experience. Yet to create this level of buyer ease requires significant behind-the-scenes work. 

Companies like Amazon use mature and robust behavioral analysis technology to create an unmatched, frictionless customer experience without sacrificing security that many e-commerce brands strive to replicate. For example, artificial intelligence (AI) and machine learning (ML) are used to monitor consumer behavior to ensure customers are who they say they are, looking at data inputs like previous purchase history, how long users browse before buying, and how users scroll on their phone screens to ensure that it’s them making the purchase. Because every user and every transaction is evaluated independently, Amazon can identify behavioral patterns that indicate probable fraud and then introduce friction in the buying process to further prevent it. Most importantly, this back-end security and customization only enhances the user experience, eliminating the hassle that comes with customers having to remember and update their password. 

Amazon and the tech industry at large have trained people to expect this level of immediacy and access -- it’s no longer a nice-to-have, but a must-have. Users want a never-log-in-again future, and it’s possible today. Seamless digital experiences have already become part of the fabric of the internet, and in a few decades, younger generations will look at usernames and passwords like the current generation looks at floppy disks, a relic of a bygone technology era. 

The problem with passwords

While the same technology that enables a great customer experience and can proactively detect and mitigate things like fraud to save companies millions, there is a weak link -- passwords.

Successfully managing dozens or more usernames and passwords to login is an impossibility for even the most tech savvy people. To cope, most people default to easily-guessed passwords or they reuse them, making all systems only as secure as the weakest one. One hacked password is used over and over to attack other systems. As a result, passwords are the leading attack vector used in data breaches, and moreover they create a poor user experience that drives customers away or causes workforce productivity to drop. In fact, on average, 75% of e-commerce shopping carts are abandoned, causing retailers more than $18 billion a year.  

The power of behavioral data

Today, most mobile devices are full of technologies, including sensors, cameras, and GPS that capture behavioral patterns, which can be used to define normal behavior for a specific user. Specific, often unconscious actions like how a person holds their phone, types on their keyboard, or moves their mouse can help identify individual human activity. Bots often show irregularities by navigating websites in a very distinct way, moving from the homepage to their objective within seconds. Obviously, bots also can’t physically hold a phone, so there is little activity with phone sensors, which is another key identifier of suspicious behavior.

While all of this behavioral analysis is ambiently occurring in the background, users have little to no visibility into how this works or ultimately how this impacts their experience, making a security system like Amazon’s nearly invisible and therefore deeply valuable. A growing number of companies are leveraging these concepts to democratize the type of behavioral analysis to which a company like Amazon has access. 

Making the move toward biometric authentication

While behavioral and biometric data is a powerful tool for companies seeking to offer the highest levels of security to users, how companies manage that data is the final puzzle piece in mitigating breaches and creating a more secure future for account authentication. By deploying a distributed authentication process that allows user data to remain on each device, rather than uploading it to a main central server where it provides an attractive target for bad actors, enterprises complicate traditional attack methods that seek to gain entry into a company’s central server to extract desired data. 

Instead, each step of the authentication process requires a specific key that is unique to each device. This key is used instead of a username and password to authenticate to the platform the user is trying to access. This technology almost works like magic, providing a streamlined yet secure experience for the appropriate user while introducing digital speed bumps for bad actors. This distributed security approach also significantly increases barriers for cybercriminals. Without a central trove of passwords to attack, hackers would have to compromise credentials on each individual device, which is much more difficult, time consuming, and ultimately much less successful for hackers. 

Ultimately, behavioral biometrics offer a powerful tool for companies seeking to streamline user experience while increasing security measures using technology and tools that are already accessible through devices. The benefits of this technology, progressed most obviously by Amazon, are significant for both consumers and businesses alike. So, while many of those discussing Jeff Bezos’ impact on the world view his legacy as creating a powerful, unprecedented e-commerce machine, it’s the underpinnings of that machine -- advances in biometrics and authentication -- that have been a quiet enabler of Amazon’s dominance and transformed how companies embrace offering the best user experience without compromising security.

KEYWORDS: behavior detection behavioral analytics biometrics cyber security password management passwords security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ben Goodman is SVP at ForgeRock. He is responsible for corporate development, global strategic partnership and technology ecosystem efforts. A member of the CEO staff, Ben drives and evangelizes ForgeRock's agenda and product direction. Prior to ForgeRock, Ben led Technology Evangelism for VMware's End-User Computing business unit, where he was engaged in the product roadmaps and acquisitions that lead to the creation of VMware Workspace One. Before that, he worked at Novell where he was instrumental in the creation and growth of the company’s Identity Management platform.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0320-cyber-feat-slide1_900px.jpg

    We are all Jeff Bezos

    See More
  • boon edam

    Best practices on integrating access control, biometrics with swing doors and security entrances

    See More
  • bank

    Banking & behavioral biometrics: Understanding privacy & security regulations

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing