Leadership Brief

Why Adaptive Authentication Is A Must

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

John Tolbert


1 Recommendations

If your IT organization stores and provides access to information such as financial, health, manufacturing, billing, logistics, government, personally identifiable information (PII), and/or intellectual property such as competition sensitive data or trade secrets, then you should implement a policy-based adaptive authentication solution that can respond to changing risk situations and require risk-appropriate authentication mechanisms to be used.

Continue reading...
Read the full report and get access to KuppingerCole Research for 4 weeks.
Start Your Free Trial
Already a subscriber? Click here to login.