Six Keys to Successful Identity Assurance – Flexible Authentication

So far, we’ve discussed the first five keys to a successful identity assurance: business context, anomaly detection, machine learning, broader ecosystem, and consistent experience. Let’s close the series with an important topic for both end users and administrators: flexible authentication. Administration Flexibility When we think of providing flexibility for administrators, we focus on the authentication…

The post Six Keys to Successful Identity Assurance – Flexible Authentication appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Flexible Authentication

Six Keys to Successful Identity Assurance – Consistent Experience

In previous blog posts in this series, we talked about many ways to intelligently determine the right level of assurance for users gaining access to specific resources. While much of the goal is to minimize interruptions in the user experiences for authentication, there are many times when the user needs to interact in some way…

The post Six Keys to Successful Identity Assurance – Consistent Experience appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Consistent Experience

Six Keys to Successful Identity Assurance – Broader Ecosystem

Earlier in this blog series, we discussed anomaly detection and machine learning focusing primarily on examples that included information you could expect to be available from the system that provides your identity assurance. It’s likely, however, that there is much more data that can be leveraged for making system access decisions in your current IT…

The post Six Keys to Successful Identity Assurance – Broader Ecosystem appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Broader Ecosystem

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this behavior, and adapting to changes in that behavior, is where the topic of this blog starts as our next key component of an identity assurance…

The post Six Keys to Successful Identity Assurance – Machine Learning appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Machine Learning

Six Keys to Successful Identity Assurance Strategy: Anomaly Detection

In granting access to users, understanding their behavior goes a long way towards providing frictionless security. As part of our blog series, Six Keys to a Successful Identity Assurance Strategy, we continue to explore going beyond simple two-factor (2FA) or multi-factor authentication (MFA) to create a successful identity assurance strategy for your organization. Previously, we…

The post Six Keys to Successful Identity Assurance Strategy: Anomaly Detection appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance Strategy: Anomaly Detection

Six Keys to a Successful Identity Assurance Strategy: Business Context

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver…

The post Six Keys to a Successful Identity Assurance Strategy: Business Context appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to a Successful Identity Assurance Strategy: Business Context