The Compelling Case for Risk-Based Adaptive Authentication

  • LANGUAGE: English DATE: Tuesday, September 24, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
The Compelling Case for Risk-Based Adaptive Authentication Making Digital Identities Secure and Compliant with Modern Authentication Technology

Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A plethora of mobile-based digital identity technologies have entered the market over the last few years to help businesses and other organization meet these challenges.

Mobile biometrics are enabling businesses to move away from insecure and cumbersome passwords for authentication. Fingerprint, facial, voice, and behavioral biometrics are becoming more popular with both consumers and employees. These solutions have both benefits and risks.

While it is not only important to offer secure and user-friendly authentication it is also of paramount importance that mobile identities comply with organizational access policies. Therefore, reliable digital identities and strong authentication is the foundation for securing critical processes in government, finance and most enterprise verticals.

Risk-based adaptive authentication can work in conjunction with mobile identity solutions to evaluate a variety of risk factors and choose appropriate authentication and authorization challenges to users, based on customer-configurable policies.

In this webinar you will learn about:

  • Trusted next generation identification, verification and authentication in a mobile world.
  • Risks and benefits of said technologies.
  • Common customer challenges such as data breaches, compliance with regulations and an increasing mobile workforce.
  • How to implement risk-based adaptive authentication and a non-disruptive, seamless deployment approach.

In the first part of the webinar, KuppingerCole Lead Analyst John Tolbert will make you familiar with common inconveniences of traditional ways of authentication for users and organizations. He will cover why it makes sense to shift to modern authentication technologies.

In the second part, John MacInnis, Product Marketing Manager IAM Solutions at HID Global, will give you specific recommendations to implement modern solutions that keep digital identities secure and facilitate compliance with organizational regulations.


Speakers

Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...


Lead Sponsor

HID Global is the trusted leader in providing access and ID management solutions for the delivery of secure identity. HID Global is focused on creating customer value worldwide with technology-based access solutions, issuance solutions, embedded technology solutions and logistics technology solutions.

As a leading manufacturer of secure identity solutions and contactless smart card technology for physical access control, HID is selected more than any other brand in the convergence of physical and logical access control. In addition, the company develops, manufactures and markets ID components, products and services typically deployed with national ID and epassport programs, corporate access control, supply chain management, animal tagging, financial transactions, transport and various industrial or manufacturing solutions.

Headquartered in Irvine, California, HID Global has over 1,900 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00