multi-factor authentication

Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race

There are times when trying to put together an effective authentication strategy feels like competing in track-and-field events. Business and IT are supposed to be on the same team, but far too often seem to be racing toward completely different goals. Sure, it’s important to get to the finish line fast, but not at the…

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this behavior, and adapting to changes in that behavior, is where the topic of this blog starts as our next key component of an identity assurance…

Answering the #1 Question in Identity Management

Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in…

MULTI-FACTOR AUTHENTICATION YOU CAN COUNT ON

More than 25,000 organizations worldwide trust RSA SecurID® Access to provide a convenient, secure multi-factor authentication experience for their users. And now RSA SecurID Access is honored to have won the SC Magazine 2017 Trust Award for best multi-factor authentication solution – three years in a row. RSA SecurID Access multi-factor identity solution had to…

Securing the Federal Government Requires a Strong Authentication Strategy

August 27, 2004, the US Department of Homeland Security issued Homeland Security Presidential Directive 12 (HSPD-12): “Policy for a Common Identification Standard for Federal Employees and Contractors.” Also, in 2004, pagers were a $6 billion industry, the iPhone was still 3 years away from existing, and “cloud” (except to a small few) referred exclusively to…

Hardware: The Safe Anchor

Last year (a couple of months after Apple’s announced the availability of Touch ID enabled iPhones), I blogged about mobile biometrics, stating the need for biometric solutions to “blend” with the rest of the moving parts of a multi-factor auth ecosystem. Over the past year, a “series” of related events have occurred; we’re seeing both the availability and adoption of various biometric methods and…