Authentication

Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race

There are times when trying to put together an effective authentication strategy feels like competing in track-and-field events. Business and IT are supposed to be on the same team, but far too often seem to be racing toward completely different goals. Sure, it’s important to get to the finish line fast, but not at the…

Key Considerations for Selecting a Consumer Authentication Vendor

The EU’s Payment Services Directive II (PSD2) has generated many questions from the financial services and payments industry. So much so we have found some in the industry turning to RSA for advice and guidance on the key considerations they need to put forth as they prepare to issue requests for proposals from potential consumer…

Protecting PingFederate® Users with RSA SecurID® Access

It’s 10 o’clock. Do you know where your users are? Believe it or not, there was once a time when this question was easy to answer. If “Steve” was logged into the corporate network, there was a very high-level of certainty you would find him sitting in his cube, on the 4th floor of building…

Protecting VMware Workspace™ ONE™ Users with RSA SecurID® Access

While 1999 brought us the Breitling Orbiter 3, Warner Bros. sci-fi thriller “The Matrix,” and Britney Spears mega-hit “Baby One More Time,” it was also a banner year in cybersecurity. During the last twelve months of the millennium, we witnessed the advent of Microsoft’s Windows 98 release, the arrival of the American Express “Blue” card…

Eliminating Access Blind Spots in the Modern Enterprise

Last year, 63% of data breaches involved compromised identities. This year, it’s up to 81%. As the world settles into the “new normal” of mobile, cloud and other nontraditional access points for applications and other resources, the problem of identity-related attacks isn’t going anywhere; to the contrary, it’s getting bigger. We can’t promise those numbers…

8 Authentication Pitfalls That Can Put You on the Road to Nowhere

Two-factor, multi-factor, mobile, push, tokenless, biometric: you have choices today when it comes to authentication solutions. Choose the right authentication solution, and you’ve got a straight shot to access that’s secure and convenient for users. Choose the wrong one, and you risk getting on a path that’s at best bumpy and at worst downright dangerous.…

New Survey: Consumers Increase Security Expectations in Wake of Password Breaches

Several years ago, I was talking to an organization which had recently deployed risk-based authentication on its online customer portal. Based on their business model, I was especially curious to learn why they had selected to add consumer authentication to their website.  The answer was simple, “It is a competitive advantage for us.” Fast forward…

The Next Generation in Consumer Authentication and Fraud Prevention

Fraud risk management has become a burden in recent years, and not just because the attackers have gotten better at their game. The tools and technologies used to detect and mitigate fraud events are better, but they are also plentiful. A recent RSA survey found that 57% of organizations use between 4 – 10 different tools…

Authentication Your Way: Have Your Security and Convenience, Too

Your diverse, dynamic user base demands fast, convenient authentication and access—no matter where they are or what devices they are using. But you need authentication to be secure above all, with visibility across all applications and resources (cloud to ground),the assurance that your users are who they say they are and entitled to the access…

Six Keys to Successful Identity Assurance – Consistent Experience

In previous blog posts in this series, we talked about many ways to intelligently determine the right level of assurance for users gaining access to specific resources. While much of the goal is to minimize interruptions in the user experiences for authentication, there are many times when the user needs to interact in some way…