The Compelling Case for Risk-Based Adaptive Authentication

  • LANGUAGE: English DATE: Tuesday, September 24, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
The Compelling Case for Risk-Based Adaptive Authentication

Making Digital Identities Secure and Compliant with Modern Authentication Technology

Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A plethora of mobile-based digital identity technologies have entered the market over the last few years to help businesses and other organization meet these challenges.

Mobile biometrics are enabling businesses to move away from insecure and cumbersome passwords for authentication. Fingerprint, facial, voice, and behavioral biometrics are becoming more popular with both consumers and employees. These solutions have both benefits and risks.

While it is not only important to offer secure and user-friendly authentication it is also of paramount importance that mobile identities comply with organizational access policies. Therefore, reliable digital identities and strong authentication is the foundation for securing critical processes in government, finance and most enterprise verticals.

Risk-based adaptive authentication can work in conjunction with mobile identity solutions to evaluate a variety of risk factors and choose appropriate authentication and authorization challenges to users, based on customer-configurable policies.

In this webinar you will learn about:

  • Trusted next generation identification, verification and authentication in a mobile world.
  • Risks and benefits of said technologies.
  • Common customer challenges such as data breaches, compliance with regulations and an increasing mobile workforce.
  • How to implement risk-based adaptive authentication and a non-disruptive, seamless deployment approach.

In the first part of the webinar, KuppingerCole Lead Analyst John Tolbert will make you familiar with common inconveniences of traditional ways of authentication for users and organizations. He will cover why it makes sense to shift to modern authentication technologies.

In the second part, John MacInnis, Product Marketing Manager IAM Solutions at HID Global, will give you specific recommendations to implement modern solutions that keep digital identities secure and facilitate compliance with organizational regulations.


Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...

Lead Sponsor

HID Global is the trusted leader in providing access and ID management solutions for the delivery of secure identity. HID Global is focused on creating customer value worldwide with technology-based access solutions, issuance solutions, embedded technology solutions and logistics technology solutions.

As a leading manufacturer of secure identity solutions and contactless smart card technology for physical access control, HID is selected more than any other brand in the convergence of physical and logical access control. In addition, the company develops, manufactures and markets ID components, products and services typically deployed with national ID and epassport programs, corporate access control, supply chain management, animal tagging, financial transactions, transport and various industrial or manufacturing solutions.

Headquartered in Irvine, California, HID Global has over 1,900 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, HID

Video download

Popular Videos

Next Webinar


Endpoint Protection Made Easy With Privilege Management

Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.

Next Conference


European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00