Contextual Authentication, also known as risk-based or adaptive authentication, works behind the scenes to prevent unauthorized access and applies the appropriate level of authentication.
Roaming users and remote access to confidential data are becoming a major security concern. In response, many organizations are over-steering towards rigid Two-Factor Authorization, which cannot adapt to different user scenarios, resulting in poor user adoption and increased frustration.
Between security and usability comes contextual authentication (or context-based authentication), which applies the appropriate level of authentication based on the context around a user's access request, including location, time, device, network, and application. For example, employees in the office may only need to provide strong passwords, whereas a traveling salesperson must provide two factors. However, a traveling salesperson now in the office only needs to provide a password to prove his identity, due to his new situation when requesting access.
Register for the webinar to learn more about the best practices for setting up a strong rule hierarchy to make contextual authentication work for you.