Overview
Use of user names and passwords for years has been the most common authentication method for accessing online and mobile commerce channels, but their misuse makes them highly vulnerable to fraud via identity theft. Two-factor authentication is an alternative designed to bolster security, but it too can be vulnerable to sophisticated attacks.
Book a Meeting with the Author
Related content
Agentic Standards: Platform Opportunities and Platform Solutions
The development of open agentic commerce protocols—notably the Universal Commerce Protocol (UCP) and Agent Commerce Protocol (ACP)—represent an expected and necessary alternative t...
Are Consumers Showing Interest in Direct Payments?
Javelin Strategy & Research’s data dives into consumer behavior show that consumers’ usage of and interest in lower-cost payment methods like account-to-account transactions and pa...
2025 Emerging Biometric Authentication at the Point of Sale Scorecard
This inaugural Javelin Strategy & Research scorecard assesses the emerging market for biometric authentication at the point of sale and identifies three Pillars in this emerging te...
Make informed decisions in a digital financial world