Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity & Business Resilience

Authenticating like the transportation security administration

By Paul Trulove
person paying online with credit card

Image via Unsplash

September 6, 2023

Everyone is familiar with the pain of waiting in the Transportation Security Administration (TSA) lines when traveling; taking off shoes and even getting hands swiped for explosive residue before being allowed to reach the gate at the airport. Created in response to the September 11 attacks to improve and consolidate air travel security, some of these methods may seem clunky and slow. TSA’s methods of authenticating identity, however, are seamless and nearly invisible to travelers. Similarly, banking institutions are also changing authentication to improve user experience without putting identity or sensitive information at risk. 

How TSA and banks authenticate

Increasingly, TSA and banks request to see only a driver’s license but are still confident that they have authenticated someone’s identity securely. TSA uses credential authentication technology (CAT) to confirm a traveler’s identity using government-issued identification credentials. CAT links to the Secure Flight database electronically to confirm identity and travelers’ flight details, display pre-screening status without requiring the traveler to show a boarding pass. CAT also detects fraudulent IDs and eliminates concerns related to boarding pass fraud. TSA is also beginning to leverage biometrics, adopting digital identity initiatives in place of a physical ID or boarding pass to verify identity when passengers are dropping off a bag, going through a security checkpoint, or checking in at the boarding gate. (Note: TSA still requires a physical ID in case a digital ID cannot be verified.) All of this happens in near real-time at security checkpoints — without placing any additional burden on travelers. 

Banks, similarly impacted by September 11, must comply with the USA Patriot Act’s requirement for banks to obtain a copy of each customer’s photo ID to open, close, or complete a transaction on an account. These organizations have also implemented advanced identification verification systems to align with both the Patriot Act and the Know Your Customer (KYC) program, which are designed to protect financial institutions against fraud, money laundering, corruption and terrorist financing. 

In addition to using a driver’s license or ID card for identity authentication, banks develop risk profiles for each customer based on their activities, behavior and characteristics to assess the likely potential of illegal activities. And as anyone who has had fraudulent account information flagged knows, banks also monitor transactions to determine whether transactions are consistent with each customer’s profile and activity as a way to identify suspicious activity. Increasingly, banks also use biometrics to authenticate users, by using:

  • Facial recognition
  • Fingerprint scanning
  • Location data
  • Mobile phone tracking
  • Eye scanning
  • Vocal patterns
  • Behavioral traits

By utilizing a wide range of data points collected autonomously, financial organizations can confirm identities without requiring multiple manual inputs, making the authentication experience both more robust and more user friendly. These invisible methods don’t interrupt the banking experience but add a critical layer of protection for both customers and the banks themselves.

Authentication that’s hard to fake

Unfortunately, passwords alone provide neither identification nor authentication. And while multi-factor authentication (MFA) is important, MFA methods that still rely on passwords simply aren't enough. And, MFA using unencrypted SMS is vulnerable to attack, as are processes that use shared secrets (which are susceptible to phishing attacks). That means one time passcodes (OTP), push to text or email, and phone calls are not only annoying interruptions, they also don’t work to securely authenticate identity.

Leveraging relevant user data and biometric information as the TSA and banks do, enterprises can use behavioral analytics to authenticate workforce users across corporate IT resources. Invisible MFA systems can detect anomalies in user behaviors and flag them for investigation without interrupting legitimate users. MFA solutions can also use geo-location to validate identity, stopping hackers from distant locations, unrecognized locations and IP addresses known to be risky. Using multiple data points to authenticate helps security leaders ensure that their workforce is continuously authenticated, regardless of which work-related resources are being accessed. 

Breadth of MFA is critical to thwarting attackers

As cybersecurity threats become increasingly sophisticated, it is critical for security leaders to neutralize attackers without placing an undue burden on individual employees. For many enterprises, the goal of implementing robust security controls and making it easy for employees to authenticate securely may seem impossible to achieve. Invisible MFA enables both secure authentication and seamless access to business-related resources.

TSA and banks continue to modernize their screening and authentication procedures and the technologies they use to both create more seamless experiences and serve the needs of a complex security ecosystem. Security leaders must approach authentication the same way, by using technology to verify identity in ways that cyber attackers can’t fake. 

KEYWORDS: biometric authentication biometric security identity (ID) management Identity Authentication multi-factor authentication

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul Trulove is CEO at SecureAuth

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iot-enews

    Could a Device Labeling System Under the Trump Administration Lead to Better IoT Security?

    See More
  • data breach

    Hackers accessed systems at the National Nuclear Security Administration

    See More
  • Authenticating Identities to Mitigate Security Breaches and Improve Business Efficiency

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing