Dr. Chris Edwards discussing identity and credential management solutions - Global Banking & Finance Review
Dr. Chris Edwards, CTO at Intercede, addresses the challenges of identity and credential management in businesses, highlighting virtual smart cards as a cost-effective solution.
Business

Overcoming the cost barrier to identity and credential management

Published by Gbaf News

Posted on April 15, 2013

3 min read

· Last updated: March 1, 2019

Add as preferred source on Google

Dr. Chris Edwards, Chief Technical Officer at Intercede

Impact of Consumerisation and BYOD Trends

Dr-Chris-EdwardsThe consumerisation of IT has left many companies vulnerable and at risk of new security threats. With the emergence of the BYOD trend, businesses have opened the doors of their network to a host of potentially unauthenticated users. Security conscious companies have implemented identity and access management technology to protect their sensitive data at the end point – the device – and make sure the right person is accessing the right information. However, some businesses are still shying away from this approach because of the upfront costs of issuing and deploying physical smart cards and smart card readers. Instead they are sticking to using insecure passwords, despite the possible costs to the business of theft or loss of IP. Enterprise firms are looking for a more cost effective option to secure their data and devices, and virtual smart cards (VSCs) are the key.

Benefits of Two Factor Authentication

The most effective technology approach for identity and access management today involves two factor authentication – ‘something I have’ (typically a physical smart card or security token) and ‘something I know’ (a PIN). The Microsoft Windows 8 release offers organisations the ability to implement two factor authentication, without the cost barrier. The release introduces the concept of VSCs, which emulate the functionality of traditional smart cards, but use the Trusted Platform Module (TPM) chip available on many organisations’ computers rather than requiring the use of a separate physical smart card and reader. Conventional smart cards and TPM virtual smart cards offer comparable levels of security, but TPM virtual smart cards can be deployed with no additional material cost, as long as employees have computers with built in TPMs. An Aberdeen Group report released in June 2012 found that US based companies employing a hardware-based root of trust show a cost advantage of more than $80 per end point per year.

Challenges in Credential Lifecycle Management

While the technology exists within Windows 8 devices for this approach, identity credentials provisioned to virtual smartcards must also be managed throughout their lifecycle via software that enables the company to issue them to trusted employees, on known machines. Additionally, these credentials need to be recovered, renewed, revoked and reset when necessary, even if users get locked out or are offline.Credential recovery is also essential if machines are lost so that the individual can access relevant systems and email on an alternative machine.

Integrating Credentials with Business Processes

Any credentials management solution should also link to a company’s in-house data stores and directories, such as the HR database, and apply secure business processes, so that firms are aware who can request and grant access to the network and who provides authorisation and collection. Furthermore, the proliferation of mobile devices has meant that the ability to support multiple platforms from Apple to Android and Blackberry is a crucial part of any mobile and credential management solution.

Maintaining a Strong Security Posture

Two factor authentication should remain the cornerstone of any device security strategy for firms who want to avoid the hefty reputational, IP and Information Commissioner’s Office (ICO) fine costs associated with data loss or theft. Virtual smart cards will help businesses to overcome the cost barrier traditionally associated with this approach but the ability to manage mobile credentials effectively on the TPM is the key to delivering on its promise.

 

 

Key Takeaways

  • Virtual smart cards (VSCs) use TPM hardware to deliver smart‑card level two‑factor authentication without extra physical devices.
  • VSC deployment on Windows 8 (and later) significantly reduces material costs by eliminating smart cards and readers.
  • Credential lifecycle—provisioning, recovery, revocation—must be managed via software like Intercede’s MyID to fully benefit.
  • TPM‑based virtual smart cards offer comparable security to physical smart cards, including non‑exportability, isolated cryptography, and anti‑hammering.
  • Supporting multiple device platforms and integrating with HR or directory systems is essential for scalable credential management.

References

Frequently Asked Questions

What are virtual smart cards (VSCs)?
VSCs emulate physical smart cards using a computer’s built‑in TPM to provide two‑factor authentication (“something you have” via TPM and “something you know” via PIN) without extra hardware.
Why are VSCs more cost‑effective than physical smart cards?
Since VSCs use existing TPM hardware in devices, organizations avoid purchasing smart cards and readers, reducing upfront and maintenance costs substantially.
Are virtual smart cards as secure as physical smart cards?
Yes. VSCs provide comparable security through TPM‑based non‑exportability, isolated cryptography, and anti‑hammering protections.
What about managing the credentials over time?
VSCs require credential lifecycle management—provisioning, recovery, revocation—via systems like Intercede’s MyID to support provisioning to known users and devices, recovery if lost, and revocation.
Do VSCs support mobile and multi‑platform devices?
Effective solutions must support multiple platforms, including Windows desktops and mobile devices (Apple, Android, BlackBerry), so credentials can be managed across diverse endpoints.

Tags

Related Articles

More from Business

Explore more articles in the Business category