Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
In many identity flows today, the user experience is the same regardless of the operation the user is trying to perform. This often means that from the user's perspective, they have a binary experience; either they are already logged and are NOT challenged, or they are not logged in and are challenged. The concepts of this talk go beyond "adaptive authentication" in that "authentication strength" is only one of the vectors being considered. This talk will define a set of identity "vectors" that can be used to provide better user experiences across the full life-cycle of user identity and service interactions.
Language: English • Duration: 17:40 • Resolution: 1280x720
BMC Helix ITSM
Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity
Database and Big Data Security
Leveraging Your Organization's Expertise: Departmental IAM Services for the Business
Digital Workplace Delivery Platforms
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity