With the advent of bring-your-own-device (BYOD) and cloud-based applications, today’s enterprise security professionals are challenged with augmenting the application access security that can be obtained through simple username and password verification and cumbersome two-factor authentication with minimal impact to the user experience.
“No enterprise wants to be called out for falling victim to a data breach, as it erodes trust,” said
Overall, context-based authentication offers three essential benefits to enterprises. These include:
• Frictionless access – Real-time, passive assessment of the login context through frictionless two-factor authentication enables businesses to streamline access for known and trusted combinations of accounts and devices – reducing effort and inconvenience for the workforce by not requiring additional one-time passwords for each login.
• Increased security – Combining global federated trust identities with context-based authentication enables businesses to quickly and easily identify high-risk connections that have the potential to compromise corporate IP and valuable data. High-risk connections include devices that are part of botnets, use of spoofed and compromised identities or devices that are known to be involved with fraudulent access across the ThreatMetrix™ Global Trust Intelligence Network (The Network).
• Operational Efficiency – Real-time API-driven big data analytics means actionable intelligence at the point of control, rather than information being stored in a data warehouse.
“Enterprise adaptive access control combines contextual information and user credentials to evaluate the risk of users attempting to access resources. Once the purview of e-commerce and financial services, adaptive access is finding an increased role in workforce identity — particularly for mobile device use cases.” [Source: “Adaptive Access Control Brings Together Identity, Risk and Context,”
“All ThreatMetrix customers benefit from anonymized shared identity and threat data worldwide across The Network, increasing the quality and value of the data as The Network grows,” said Taussig. “Due to shared data on The Network, in
Federating identities without federating trust creates many opportunities for cybercrime. Combining context-based authentication and a global federated identity network is the most efficient and cost effective way for enterprises to reduce the threat of data breaches from unauthorized application access, eliminating employee friction. This includes protection against both internal and external threats, since enterprises now face risks from employees who jeopardize regulatory compliance through unauthorized password sharing and other risky behaviors.
In addition to its evolution as a context-based authentication provider for enterprises,
To learn more about ThreatMetrix’s context-based authentication and advanced fraud solutions, stop by booth 232 in the South Expo at
For more information, visit http://www.threatmetrix.com or call 1-408-200-5755.
Join the cybersecurity conversation by visiting the
Read the full story at http://www.prweb.com/releases/2014/02/prweb11602390.htm
Most Popular Stories
- Major Phone Makers Sign Anti-Phone-Theft Pledge
- College Board Offers a Sneak Peak at New SAT
- 'Beige Book' Federal Reserve Survey, April 2014: Full Text
- Salsa Legend Cheo Feliciano Killed in Car Crash
- Miss. Gov. Signs Bills to Curb Unions
- Hiring and Weekly Jobless Claims Both Edge Up
- Yellen Remarks, Market Data Give Stocks a Boost
- Chevrolet's Small SUV Coming to the U.S.
- Is This Job Too Good to Be True?
- Yahoo Struggles Despite Alibaba Boost