Contextual Authentication Configuration & User Segmentation

Logo
Presented by

Kimberly Johnson (VP Product Marketing), Christopher Perry (Technical Support Engineer), Kevin Wiser (Solutions Architect)

About this talk

Contextual Authentication, also known as risk-based or adaptive authentication, works behind the scenes to prevent unauthorized access and applies the appropriate level of authentication. Roaming users and remote access to confidential data are becoming a major security concern. In response, many organizations are over-steering towards rigid Two-Factor Authorization, which cannot adapt to different user scenarios, resulting in poor user adoption and increased frustration. Between security and usability comes contextual authentication (or context-based authentication), which applies the appropriate level of authentication based on the context around a user's access request, including location, time, device, network, and application. For example, employees in the office may only need to provide strong passwords, whereas a traveling salesperson must provide two factors. However, a traveling salesperson now in the office only needs to provide a password to prove his identity, due to his new situation when requesting access. Register for the webinar to learn more about the best practices for setting up a strong rule hierarchy to make contextual authentication work for you.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (21)
Subscribers (504)
BIO-key provides flexible identity and access management solutions, integrated with Identity-Bound Biometrics and backed by decades of expertise. Learn more at www.BIO-key.com.