What Skiing Taught Me About Managing Digital Risk: Be Prepared

Every organization in today?s digital world faces a choice: Pursue digital transformation and the opportunity it brings, or get left behind by those who do. Identity and access management (IAM) has an important role to play in helping manage risks that… Continue reading What Skiing Taught Me About Managing Digital Risk: Be Prepared

Delivering Convenient and Secure Access to the Modern Workforce

In the relatively quick journey from don’t-even-think-about-bringing-your-own-device to please-absolutely-bring-your-own-device, identity management has experienced some dramatic transformations. And it’s still evolving now, as security policy continues to move away from limiting user options and toward expanding them. Organizations haven’t taken long to come around to thinking that giving users more ways to access the resources they…

The post Delivering Convenient and Secure Access to the Modern Workforce appeared first on Speaking of Security – The RSA Blog.

Continue reading Delivering Convenient and Secure Access to the Modern Workforce

Six Keys to Successful Identity Assurance – Flexible Authentication

So far, we’ve discussed the first five keys to a successful identity assurance: business context, anomaly detection, machine learning, broader ecosystem, and consistent experience. Let’s close the series with an important topic for both end users and administrators: flexible authentication. Administration Flexibility When we think of providing flexibility for administrators, we focus on the authentication…

The post Six Keys to Successful Identity Assurance – Flexible Authentication appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Flexible Authentication

Authentication Your Way: Have Your Security and Convenience, Too

Your diverse, dynamic user base demands fast, convenient authentication and access—no matter where they are or what devices they are using. But you need authentication to be secure above all, with visibility across all applications and resources (cloud to ground),the assurance that your users are who they say they are and entitled to the access…

The post Authentication Your Way: Have Your Security and Convenience, Too appeared first on Speaking of Security – The RSA Blog.

Continue reading Authentication Your Way: Have Your Security and Convenience, Too

Six Keys to Successful Identity Assurance – Consistent Experience

In previous blog posts in this series, we talked about many ways to intelligently determine the right level of assurance for users gaining access to specific resources. While much of the goal is to minimize interruptions in the user experiences for authentication, there are many times when the user needs to interact in some way…

The post Six Keys to Successful Identity Assurance – Consistent Experience appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Consistent Experience

Six Keys to Successful Identity Assurance – Broader Ecosystem

Earlier in this blog series, we discussed anomaly detection and machine learning focusing primarily on examples that included information you could expect to be available from the system that provides your identity assurance. It’s likely, however, that there is much more data that can be leveraged for making system access decisions in your current IT…

The post Six Keys to Successful Identity Assurance – Broader Ecosystem appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Broader Ecosystem

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this behavior, and adapting to changes in that behavior, is where the topic of this blog starts as our next key component of an identity assurance…

The post Six Keys to Successful Identity Assurance – Machine Learning appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Machine Learning

Six Keys to a Successful Identity Assurance Strategy: Business Context

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver…

The post Six Keys to a Successful Identity Assurance Strategy: Business Context appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to a Successful Identity Assurance Strategy: Business Context

Continuous Identity Assurance Allows You To Step Away

Have you ever wondered how do applications know if “its still you” 10 minutes after you log in to the app? Suppose you have to join a conference call, leave for a meeting, or take a bio break. As far as the app is concerned, since you haven’t performed any activity for a given period…

The post Continuous Identity Assurance Allows You To Step Away appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Continuous Identity Assurance Allows You To Step Away