Six Keys to Successful Identity Assurance – Flexible Authentication
So far, we’ve discussed the first five keys to a successful identity assurance: business context, anomaly detection, machine learning, broader ecosystem, and consistent experience. Let’s close the series with an important topic for both end users and administrators: flexible authentication. Administration Flexibility When we think of providing flexibility for administrators, we focus on the authentication…
The post Six Keys to Successful Identity Assurance – Flexible Authentication appeared first on Speaking of Security – The RSA Blog.
Continue reading Six Keys to Successful Identity Assurance – Flexible Authentication