Why Adaptive Authentication Is A Must
Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.
If your IT organization stores and provides access to information such as financial, health, manufacturing, billing, logistics, government, personally identifiable information (PII), and/or intellectual property such as competition sensitive data or trade secrets, then you should implement a policy-based adaptive authentication solution that can respond to changing risk situations and require risk-appropriate authentication mechanisms to be used.
Full article is available for registered users with free trial access or paid subscription.
Register and read on!
Sign up for the Professional or Specialist Subscription Packages to access the entire body of the KuppingerCole research library consisting of 700+ articles.