The gates are up, but at what cost?

In medieval ages, fortresses were constructed to keep enemies out. Their thick walls and heavy gates provided security but often led to inefficiencies and restricted freedom for those inside. People endured delays and obstacles simply to remain protected.

Today, our digital systems function as modern-day fortresses. Authentication mechanisms— such as passwords, captchas, and two-factor authentication (2FA)— act as gates, safeguarding sensitive data from cyber threats. While these measures are essential, they often impose significant burdens on users.

According to Okta’s 2022 State of Secure Access report, every time you retrieve a code for two-factor authentication (2FA), it takes, on average, 16 seconds. These small moments add up quickly, with users spending more than 6 hours a year navigating repetitive login barriers. That’s 6 hours you could have spent reading a book, exercising, spending time with your family, or even finishing a project at work. Instead, it’s wasted navigating systems designed to protect companies but often at the user’s expense.

We know security is non-negotiable, and the risks are very real for companies. Cyber threats are growing more sophisticated, and measures like 2FA have become the norm. While these protocols are positioned as tools to minimize intrusion, they often come at the user’s expense— creating frustration, inefficiency, and an experience that feels like an afterthought.

Instead of designing systems that respect the user journey, many companies rely on rigid, outdated security measures as insurance— more about minimizing their liability than improving the user experience. This raises an essential question: Are they solving the right problems, or are they simply creating new ones for their users?

The User Frustration Cycle – Security Over Convenience

We’ve all been there—trying to log into a trusted app only to spend the next few minutes hunting down a code that was emailed, being forced to change your password, or worse, realizing you’re locked out on another device because it still has the old password saved. These scenarios are all too common and highlight the gap between company-centric security goals and user-centric experiences.

Modern authentication systems frequently adopt a reactive stance, focusing on immediate threats without anticipating future challenges. This approach results in rigid methods that frustrate users.

Common Shortcomings:

Fear-driven design: Systems are often developed in response to breaches, emphasizing damage control over proactive innovation.

One-size-fits-all measures: Applying uniform security protocols to all users and actions leads to unnecessary friction.

Overly rigid policies: Mandating complex passwords and frequent resets can cause users to abandon login attempts. According to the Baymard Institute, 18% of consumers have abandoned their cart or sign-up attempt due to an arduous login process.

While these strategies may mitigate immediate risks, they often alienate users and miss opportunities to build trust through intelligent, adaptive security measures. Friction caused by unnecessary prompts or redundant steps affects all users, no matter the risk level, as if they are equally threatening. This is security that’s “good for them, but bad for the user.”

Duo Security’s Usability Study, found that more than 30% of users abandon login attempts entirely if the process is too frustrating, costing companies engagement and trust. Companies need to reevaluate their approach to security and ask themselves: Are current measures truly targeting high-risk threats, or are they inconveniencing users unnecessarily?

Where Authentication Fails Users

Understanding the limitations of current systems is crucial for developing smarter defenses. Users frequently encounter the following issues:

  • Forced password resets: Arbitrary reset requirements disrupt workflows and tend to result in weaker, easily remembered passwords.
  • Complex password rules: Despite the NIST (National Institute of Standards and Technology) no longer recommending overly complex password requirements and periodic resets, many companies still mandate lengthy passwords with special characters and forced resets. These outdated practices frustrate users and encourage insecure behaviors, such as writing passwords down or reusing similar patterns.
  • Third-party password management: Complexity requirements often prompt users to save their passwords on a browser or use a browser generated password—creating credentials users can’t remember without access to that browser, leading to repeated resets and more friction.
  • Frequent reauthentication: Aggressive timeout policies and repeated prompts interrupt productivity, especially during routine tasks.
  • Inconsistent device experiences: Updating a password on one device but being locked out on another creates unnecessary recovery steps.
  • Overreliance on 2FAAccording to CISA’s Multifactor Authentication Guidance, this introduces additional risks, such as SIM-swapping attacks or intercepted messages. Losing access to a phone or email account can leave users stranded without alternative authentication options. More secure alternatives, like authenticator apps and physical keys, offer better protection while reducing vulnerabilities.

These frustrations indicate that systems are not designed with the user in mind, leading to wasted time, reduced trust, and diminished engagement.

Where Passkeys Fit In

The rise of passkeys represents a meaningful step forward in the authentication landscape, but their effectiveness still hinges on cross-device compatibility, ecosystem lock-in, and fallback mechanisms when primary devices are lost or inaccessible. For enterprise applications—especially those requiring multi-platform flexibility, shared access, or step-up verification—the conversation cannot end at passkeys.

This is why any modern approach to authentication must view passkeys not as a replacement for strategy, but as one component within a broader framework that also includes contextual risk analysis, behavioral signals, and multi-modal fallback options. The momentum behind passkeys reinforces the urgency of designing authentication journeys that are seamless, adaptive, and architected for long-term scalability.

Bridging Security and Usability: Re(AI)magining Authentication

Rethinking authentication requires more than advanced technologies— it demands smarter application. Persistent is focused on creating solutions that address security challenges while respecting user experience, leveraging forward-looking trends that illustrate how authentication can evolve. Our consulting and engineering teams regularly advise clients across industries on how to modernize digital identity flows and reduce authentication friction using AI, behavioral analytics, and user-centric design. These strategies serve as the foundation of Persistent’s solutions designed to transform authentication into a seamless, secure experience.

Bridging Security and Usability: Re(AI)magining Authentication

Building Smarter Authentication Solutions

At Persistent, we’re tackling the challenges of login security and user authentication by integrating advanced technologies that prioritize both security and user experience. This is a deliberate effort to rethink authentication in a way that aligns security protocols with real-world user needs and behaviors.

By leveraging AI, advanced behavioral analytics, and adaptive authentication, we enable organizations to:

  • Streamline Login Processes: Reducing friction for users by optimizing workflows and removing unnecessary hurdles for low-risk activities.
  • Adapt Authentication to Context: Employing real-time analysis to tailor security measures based on user behavior, device, and location.
  • Align with Evolving Risk Profiles: Ensuring authentication systems remain flexible and scalable to meet the demands of today’s dynamic security environment.

Through this, we’re demonstrating how security can evolve to be not just protective but intuitive— making authentication smarter, faster, and more aligned with the expectations of modern users.

Leading the Way in Smarter Authentication

Customers demand more from authentication systems and companies now face a pivotal choice: continue relying on outdated repetitive and rigid measures or embrace intelligent, adaptable approaches that protect users without alienating them. Success lies in striking the delicate balance between security and convenience, and those who master it will gain a competitive edge in a crowded market. Persistent continues to build on this momentum through cross-functional collaboration, bringing together security experts, user experience designers, and technologists to develop practical authentication strategies tailored to real-world needs.

Persistent strives to align security with usability and our strategy integrates advanced technologies with a deep understanding of user needs, creating systems that protect without alienating users. Strong defenses shouldn’t confine those they’re meant to protect. Instead, they should foster trust, freedom, and efficiency. By adopting context-aware strategies, leveraging advancements in AI, and rethinking what it means to secure digital identities, companies can redefine authentication, not just as a barrier but as an enabler. It’s not just about being good for them or good for us— it’s about being great for both.

Author’s Profile

Brent Teitel

Brent Teitel

Chief Principal, BFSI Consulting

Brent Teitel has extensive experience in the payments industry, including senior roles at Mastercard and Wells Fargo. Known for driving product innovation and market expansion, Brent’s transformative approach positions clients for success through modernization and customer-centric strategies. With a proven track record in developing data-driven strategies, building products, and identifying opportunities that scale usage and drive revenue, Brent has collaborated with fintech partners to launch innovative digital payment solutions across new markets and verticals. He has earned six payments industry awards and holds eight patents.