identity assurance

Six Keys to Successful Identity Assurance – Flexible Authentication

So far, we’ve discussed the first five keys to a successful identity assurance: business context, anomaly detection, machine learning, broader ecosystem, and consistent experience. Let’s close the series with an important topic for both end users and administrators: flexible authentication. Administration Flexibility When we think of providing flexibility for administrators, we focus on the authentication…

Authentication Your Way: Have Your Security and Convenience, Too

Your diverse, dynamic user base demands fast, convenient authentication and access—no matter where they are or what devices they are using. But you need authentication to be secure above all, with visibility across all applications and resources (cloud to ground),the assurance that your users are who they say they are and entitled to the access…

Six Keys to Successful Identity Assurance – Consistent Experience

In previous blog posts in this series, we talked about many ways to intelligently determine the right level of assurance for users gaining access to specific resources. While much of the goal is to minimize interruptions in the user experiences for authentication, there are many times when the user needs to interact in some way…

Six Keys to Successful Identity Assurance – Broader Ecosystem

Earlier in this blog series, we discussed anomaly detection and machine learning focusing primarily on examples that included information you could expect to be available from the system that provides your identity assurance. It’s likely, however, that there is much more data that can be leveraged for making system access decisions in your current IT…

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this behavior, and adapting to changes in that behavior, is where the topic of this blog starts as our next key component of an identity assurance…

Six Keys to a Successful Identity Assurance Strategy: Business Context

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver…

Proximity-Based Identity Assurance: Balancing Act Between Security & Convenience

For years, finding the right balance between security and usability has been one of the biggest challenges for identity and access management (IAM) solution architects and designers. There are ongoing efforts in the industry to replace password-based authentication with something more secure, more convenient, and with minimum investment; such proposed methods seem to fall into…

Continuous Identity Assurance Allows You To Step Away

Have you ever wondered how do applications know if “its still you” 10 minutes after you log in to the app? Suppose you have to join a conference call, leave for a meeting, or take a bio break. As far as the app is concerned, since you haven’t performed any activity for a given period…

The Access Tug of War

While contemplating the user access management struggle between easier access and more security my mind goes back to the Tastes Great / Less Filling Miller Lite commercials of my childhood. Miller Lite claimed to be the solution to both great tasting and less filling beer. In access management, users want easier to use applications with easier access.…

Internet Voting…What Could Possibly Go Wrong?

Cybersecurity experts are known for their tough and varied opinions: Put six different experts in a room and you’ll wind up with 10 different opinions, the old saw goes. With the US 2016 election cycle in full swing, internet voting is once again back in the news, this time in Utah as the state’s Republican…