How Passwordless solves the “Identity Crisis” in banking

Don Shin | July 18, 2024

Cybersecurity leaders at financial services companies have their work cut out for them – M&As, changing regulations, ongoing transformation, and the endless stream of threats levied by modern cyber criminals. No news there. What is somewhat surprising is that, in 2024, very few available technologies solve problems on all fronts. Multi-factor authentication (MFA) represents one exception in that it’s able to:

What makes MFA suddenly so valuable?  

Experts have declared identity the “new perimeter” of modern cybersecurity defenses and MFA a key strategy in improving identity verification. MFA aims to stop phishing and credential abuse that leads to malware, ransomware, data leaks, supply chain and insider threats.

US NIST, CISA, MITRE ATT&CK all tout the importance of MFA to a zero trust philosophy, but readily acknowledge . . .

MFA as we know it falls short

MFA strengthens identify verification versus relying on passwords alone, but most solutions keep passwords as the first factor of authentication. That renders MFA far less valuable than expected.

A passwordless approach takes away attackers’ favorite tool—phishing—while increasing confidence that the person attempting to log in is a legitimate user looking to do only legitimate things. Getting rid of passwords (which represent “something users know”) and incorporating stronger pillars of identity verification — like something users have and something users “are” — eliminates most risk from impersonation and social engineering as well as:

  • The 80+% of breaches that involve compromised credentials
  • Phishing, modern phishing-as-a-service (PhaaS) and man in the middle (MITM) attacks
  • All doubt that those responsible for security did everything possible to avoid credential compromise abuse of trust

But for passwordless to work, financial services organizations must extend secure login to every member of the workforce and every application, from any device or location.

Sound hard?

It doesn’t have to be. Our new ebook, Five Ways Financial Services IT Leaders Use MFA to End the “Identity Crisis, shows how passwordless MFA can be much easier than it sounds.

Before we summarize that, let’s recap how passwordless MFA solves three of financial service IT leaders’ biggest challenges:

MFA Makes M&As Go Faster

A succession of mergers creates a gnarly mass of fragmented identities and login workflows. Workforce consolidation is as good a time as any to centralize and standardize around a single unified login and streamlined mechanism to access apps and infrastructure. But how?

Two approaches to consolidating MFA

Merging companies may use multiple IAM solutions like Okta, Ping, and Azure to access applications and Active Directory to manage identities on the back end. Standardizing on one approach eliminates disjointed workflows that give rise to visibility gaps, a frustrating user experience, and complex audit trails. 

Option 1. Universal IAM

Large IAM vendors propose a “universal IAM” approach: transitioning all users, applications, directories, and identity infrastructures to their one IAM platform. The “universal IAM” approach sounds simpler in theory but phased migrations can take months, years, or never get completed at all. IT may need to recode applications to support the vendor’s single sign-on (SSO) and FIDO2 technology — no small feat since retooling a single application to work with a new IAM takes 5-7 days, best-case scenario.  

Option 2. Unified MFA  

Secret Double Octopus delivers the same security benefits and streamlined user experience, only faster. Migrating the MFA portion of the login process to the Octopus platform adds a flexible passwordless authentication layer that works with any existing IAM platforms. IT can migrate users without recoding applications or directories. 

Modern Security for Legacy Apps

The banking industry’s heightened focus on protecting customer data leads financial services institutions to store privileged data onsite instead of migrating to public cloud services. Storing data on legacy server infrastructures, and even some old mainframe computers within data centers may be safer, but maintaining older systems brings its own challenges.

And needless to say, the talent pool of experts versed in older technologies shrinks every year and companies hesitate to disrupt complex infrastructures that predate the current team.

“On-prem” doesn’t always mean “old” 

Bloomberg reported that 54% of all new applications are being deployed locally1 versus in the cloud. While doubling down on data center operations, companies must find new ways to strike the balance between digitalization, security, and user experience — a formidable challenge since most IAM strategies, and even most MFA solutions, heavily target cloud and Web-based applications.

Financial companies’ workforces typically support a range of Windows, Macs, Linux, legacy and custom systems. Windows Hello for Business (WHfB) only works with some-not-all Windows platforms. FIDO2 technology only work with web-based resources. Partial use case coverage leaves enterprises at a loss to deliver a secure, unified high-assurance login for all remote and local users.

Octopus upholds a legacy of trust

Octopus Passwordless MFA delivers three essential advantages:

Octopus provides enterprise-wide use case coverage for on-prem, remote and cloud applications. All applications can be migrated quickly and easily instead of one-by-one so companies growing by acquisition can quickly integrate new workforces and tighten controls as they go.


  1. Software cloud shift still early, with 54% of apps on-premise ↩︎
Figure 2 Octopus delivers enterprise-wide passwordless MFA use case coverage

The CISO’s new dilemma: “Did we do enough?”

Ninety percent (90%) of data breaches still start with a phish and about 90% of MFA solutions can’t stop phishing. Following a breach, penalties (and next year’s insurance premiums) may hinge on subjective assessments of whether security leaders did enough to stop it from happening.

One definitive doctrine, the NIST 800-63 (Digital Identity Guideline) spells out requirements for high assurance MFA based on the potential harm a failed authentication might cause to an organization and its stakeholders. The Octopus platform delivers AAL3-compliant identity verification for high-assurance, phishing-resistant MFA for highly regulated industries.  

Impact of failed authenticationMaximum impact to safetyAcceptable authentication methods
AAL1LowNone possibleUsername & password SMS/email OTP MFA
AAL2ModerateLowMobile push notifications OTP tokens
AAL3HighModerate or highHigh assurance authentication

Adopting passwordless MFA helps make the case that companies did everything in their power to prevent and neutralize attacks based on compromised credentials and identities. Continuing to use passwords clearly proves they did not.

High-Assurance MFA Makes Dollars and Sense

Every industry will eventually adopt a phishing-resistant, passwordless approach to MFA but financial services companies will likely be early adopters — and early beneficiaries as:

  • Passwordless MFA pays for itself in the first year
  • Phishing-resistance eliminates 80%+ of risk
  • Employees become 5% more productive  
  • IT avoids up to 40% of all Help Desk calls  

Choosing the ideal solution  

Read the eBook for a quick checklist of questions to ask in evaluating the ideal MFA solution for your company.