Fraud Prevention and Multi-factor Authentication
- LANGUAGE: English DATE: Wednesday, March 11, 2009 TIME: 17:00 - 17:45
In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk about his experiences from numerous projects.
Consumers and the enterprise loose when internet fraud occurs. With the increasing sophistication of fraudsters and regulations governing online data privacy, organizations need a robust security solution. Such a solution must ensure that online activities are legitimate. It must as well work with centralized policies and centralized access control.
Effective security solutions evaluate risk and confirm identities by validating multiple aspects of a user, thus focusing on the risk in specific contexts. They also take action against fraud in real time. Such access systems can provide an improved level of security with context-sensitive online authentication and authorization. Thus, the risk related to any online activity, from an enterprise point of view, should be evaluated and proactively acted upon based on various types of data such as device, location, user, behaviour, historical data and combinations of those.
In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk about his experiences from numerous projects.
This webinar is sponsored by Oracle.
Agenda
Speakers
Gold Sponsor

Downloads
Trending Videos
Next Webinar
Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment
Sep 13, 2022
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.