Der Blätterkatalog benötigt Javascript.
Bitte aktivieren Sie Javascript in Ihren Browser-Einstellungen.
The Blätterkatalog requires Javascript.
Please activate Javascript in your browser settings.
itsa 2025 18 itsa Magazine 2025 www markttechnik de Swissbit FIDO security keys Secure Scalable Futureproof FIDO security keys offer a secure and userfriendly alternative to passwords protecting against phishing insider attacks and compromised devices They are compatible with existing systems scalable efficient and meet regulatory requirements By Alexander Summerer Head of Authentication at Swissbit In light of growing cyber threats and regulatory requirements modern authentication methods are increasingly coming into focus FIDO security keys offer a particularly secure and userfriendly alternative to passwords SMS codes or appbased methods They provide reliable protection against phishing compromised end devices and insider attacks while also being easy to integrate into existing infrastructures Why is it worth making the switch? Enhanced security thanks to modern cryptography Unlike traditional methods FIDO is based on asymmetric cryptography whereby the private key is securely stored in the hardware token and never leaves it Authentication is only triggered when the web address is correct and the user interacts with the device physically for example by touching it or entering a PIN Shared or reusable secrets are completely eliminated The tamperproof smartcard chips used meet some of the highest security certifications such as FIPS 140-3 Identity verification takes place locally on the chip preventing access data from being read even in the event of physical access FIDO security keys thus offer robust protection against phishing replay attacks maninthemiddle attacks and brute force attempts They also significantly reduce the risk of insider threats This is particularly important in highly regulated or securitycritical industries such as healthcare public administration and critical infrastructure operators as it enables both security standards and legal requirements to be met These include NIS2 DORA EU CISA ZTMM OMB M-22-09 and the US Executive Order on Cybersecurity Another advantage of FIDO security keys is that they are compatible with a wide range of systems They can be used with standard identity and access management systems and support industry standards such as FIDO2 HOTP TOTP and smart card systems such as PIV This enables companies to continue using their existing infrastructure and implement a phased rollout eliminating the need for transitional solutions Some models also offer the option of integrating physical access control for example via MIFARE This enables digital identities and access to buildings or security areas to be managed via a single device The iShield Key 2 from Swissbit is one such example combining FIDO2 and smart card functions as well as MIFARE access control in a compact stick Such combined solutions are particularly ad-Im ag e Sw is sb it