SHARE
Facebook X Pinterest WhatsApp

Seeing Is Believing in Security

With the advent of the holiday shopping season, interest in all things related to online security starts to rise. But when it comes to security, the real challenge has as much to do with the way people behave as it is the underlying technology. So with that issue in mind, the folks at Confident Technologies […]

Written By
MV
Mike Vizard
Nov 29, 2010

With the advent of the holiday shopping season, interest in all things related to online security starts to rise.

But when it comes to security, the real challenge has as much to do with the way people behave as it is the underlying technology. So with that issue in mind, the folks at Confident Technologies have come up with a way that leverages images to enhance traditional password security.

The Confident ImageShield is a service that allows companies to present users with a series of images that uniquely corresponds to them. The images are hosted and managed as a cloud computing service by Confident Technologies in order to minimize the management and deployment complexity of such an approach.

Bill Goldbach, executive vice president for Confident Technologies, says the Confident ImageShield isn’t meant to replace passwords so much as to add another layer of security because passwords are so easily compromised.

Of course, the concept of asking users to identify images to help assure their identity has been around for a while. But Confident Technologies is trying to take the idea to another level by using a series of images to create what amounts to a multi-factor authentication system because hackers and the botnets they create can’t mimic the simple act of an end user choosing to remember a series of images that are personal to them.

Naturally, it may take a while for users to get use to this idea. And not everything is going to be worth adding another layer of security. But in instances where you need to be sure that the person on the other end of the Web is who they claim to be, an image-based approach to authentication could definitely add a little more peace of mind to the transaction.
 

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.