The Key to Mobile Security: Take the Authentication and Authorization Context into Account
Facebook Twitter LinkedIn

The Key to Mobile Security: Take the Authentication and Authorization Context into Account

Combined Session
Thursday, May 16, 2013 16:30—17:30
Location: AMMERSEE 1

The Key to Mobile Security: Take the Authentication and Authorization Context into Account

Organizations today understand the need to mitigate risks for corporate systems and information through access via mobile devices. However, the point solutions for MDM (Mobile Device Management) etc. don’t really solve this problem – especially when understanding the bigger picture of Information Security in these days of the Computing Troika, where Cloud Computing, Social Computing, and Mobile Computing are game changers for Information Security. It is about understanding that the way we do authentication and authorization has to change. It is about taking the context into account. How big is the risk, depending on the type of user, the device used, his location, the type of authentication, and all the other contextual information? Is this risk too big to grant access or not? Starting with context not only mitigates mobile security risks, it overall helps mitigating Information Security risks in an increasingly complex world. Thus, risk- and context-based authentication and authorization plus the support for versatility in the open ecosystem of an extended enterprise are key to – not only – mobile security. This session will explain how to move from tactical point solutions towards a strategic approach.

The Key to Mobile Security: Take the Authentication and Authorization Context into Account
Presentation deck
The Key to Mobile Security: Take the Authentication and Authorization Context into Account
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...

Facing The Future: Identity Opportunities for Mobile Operators

With the advent of 4G/LTE, mobile operators are facing challenges and opportunities that will shape the future direction of communications for at least the next five to ten years. Faced with the erosion of revenues from the rapid encroachment of the so-called OTT (over the top) players, such as Apple, Google and many others, into their traditional market strongholds, operators are coming to the increasing realisation that data – ‘big data’ – represents their most significant asset in terms of being able to provide added value to their customers in the future. A key aspect of this transformation will be how operators are seen to astutely manage the wealth of user data at their disposal to good effect and position themselves as secure identity brokers and/or identity providers in what is already becoming a highly competitive market. This presentation will highlight the challenges facing operators in this brave new world and give examples of how some operators are already addressing the opportunities.

Facing The Future:  Identity Opportunities for Mobile Operators
Presentation deck
Facing The Future: Identity Opportunities for Mobile Operators
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Jörg Heuer
Jörg Heuer
Deutsche Telekom Laboratories
Jörg Heuer started working for a Deutsche Telekom engineering subsidiary in 1997, defining and leading more than 30 projects for all divisions of the Deutsche Telekom group. Currently Heuer is...
Prof. Dr. Kai Rannenberg
Prof. Dr. Kai Rannenberg
Goethe University Frankfurt
Prof. Dr. Kai Rannenberg holds the Chair of Mobile Business & Multilateral Security (www.m-chair.de) at Goethe University Frankfurt since 2002. While the chair is part of the Faculty of...
Subscribe for updates
Please provide your email address