Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity & Business Resilience

Authenticating like the transportation security administration

By Paul Trulove
person paying online with credit card

Image via Unsplash

September 6, 2023

Everyone is familiar with the pain of waiting in the Transportation Security Administration (TSA) lines when traveling; taking off shoes and even getting hands swiped for explosive residue before being allowed to reach the gate at the airport. Created in response to the September 11 attacks to improve and consolidate air travel security, some of these methods may seem clunky and slow. TSA’s methods of authenticating identity, however, are seamless and nearly invisible to travelers. Similarly, banking institutions are also changing authentication to improve user experience without putting identity or sensitive information at risk. 

How TSA and banks authenticate

Increasingly, TSA and banks request to see only a driver’s license but are still confident that they have authenticated someone’s identity securely. TSA uses credential authentication technology (CAT) to confirm a traveler’s identity using government-issued identification credentials. CAT links to the Secure Flight database electronically to confirm identity and travelers’ flight details, display pre-screening status without requiring the traveler to show a boarding pass. CAT also detects fraudulent IDs and eliminates concerns related to boarding pass fraud. TSA is also beginning to leverage biometrics, adopting digital identity initiatives in place of a physical ID or boarding pass to verify identity when passengers are dropping off a bag, going through a security checkpoint, or checking in at the boarding gate. (Note: TSA still requires a physical ID in case a digital ID cannot be verified.) All of this happens in near real-time at security checkpoints — without placing any additional burden on travelers. 

Banks, similarly impacted by September 11, must comply with the USA Patriot Act’s requirement for banks to obtain a copy of each customer’s photo ID to open, close, or complete a transaction on an account. These organizations have also implemented advanced identification verification systems to align with both the Patriot Act and the Know Your Customer (KYC) program, which are designed to protect financial institutions against fraud, money laundering, corruption and terrorist financing. 

In addition to using a driver’s license or ID card for identity authentication, banks develop risk profiles for each customer based on their activities, behavior and characteristics to assess the likely potential of illegal activities. And as anyone who has had fraudulent account information flagged knows, banks also monitor transactions to determine whether transactions are consistent with each customer’s profile and activity as a way to identify suspicious activity. Increasingly, banks also use biometrics to authenticate users, by using:

  • Facial recognition
  • Fingerprint scanning
  • Location data
  • Mobile phone tracking
  • Eye scanning
  • Vocal patterns
  • Behavioral traits

By utilizing a wide range of data points collected autonomously, financial organizations can confirm identities without requiring multiple manual inputs, making the authentication experience both more robust and more user friendly. These invisible methods don’t interrupt the banking experience but add a critical layer of protection for both customers and the banks themselves.

Authentication that’s hard to fake

Unfortunately, passwords alone provide neither identification nor authentication. And while multi-factor authentication (MFA) is important, MFA methods that still rely on passwords simply aren't enough. And, MFA using unencrypted SMS is vulnerable to attack, as are processes that use shared secrets (which are susceptible to phishing attacks). That means one time passcodes (OTP), push to text or email, and phone calls are not only annoying interruptions, they also don’t work to securely authenticate identity.

Leveraging relevant user data and biometric information as the TSA and banks do, enterprises can use behavioral analytics to authenticate workforce users across corporate IT resources. Invisible MFA systems can detect anomalies in user behaviors and flag them for investigation without interrupting legitimate users. MFA solutions can also use geo-location to validate identity, stopping hackers from distant locations, unrecognized locations and IP addresses known to be risky. Using multiple data points to authenticate helps security leaders ensure that their workforce is continuously authenticated, regardless of which work-related resources are being accessed. 

Breadth of MFA is critical to thwarting attackers

As cybersecurity threats become increasingly sophisticated, it is critical for security leaders to neutralize attackers without placing an undue burden on individual employees. For many enterprises, the goal of implementing robust security controls and making it easy for employees to authenticate securely may seem impossible to achieve. Invisible MFA enables both secure authentication and seamless access to business-related resources.

TSA and banks continue to modernize their screening and authentication procedures and the technologies they use to both create more seamless experiences and serve the needs of a complex security ecosystem. Security leaders must approach authentication the same way, by using technology to verify identity in ways that cyber attackers can’t fake. 

KEYWORDS: biometric authentication biometric security identity (ID) management Identity Authentication multi-factor authentication

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul Trulove is CEO at SecureAuth

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iot-enews

    Could a Device Labeling System Under the Trump Administration Lead to Better IoT Security?

    See More
  • data breach

    Hackers accessed systems at the National Nuclear Security Administration

    See More
  • wearable-enews

    Return of the Lost and Stolen: Authenticating Wearables

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing