SlideShare une entreprise Scribd logo
1  sur  37
WEBINAR
AUTHENTIFUSION
CLARIFYING THE FUTURE OF USER AUTHENTICATION
MARCH 2016
MICHAEL THELANDER
Product Marketing Manager, Authentication
2
Understand Advanced Authentication as a multilayered approach
Understand the critical relationship between Advanced Authentication and Risk
Understand the role of device recognition in a “passwordless” future
Provide a three-step plan to evaluate device-based authentication for your customers
3
4
5
PASSWORDS HAVE BEEN WITH US A LONG TIME
PA S S W O R D S I N R O M A N G A R R I S O N S
1
2
3
4
5
6
7
81
0
9
6
PASSWORDS HAVE BEEN WITH US A LONG TIME
PA S S W O R D S I N H A M L E T
7
PASSWORDS HAVE BEEN WITH US A LONG TIME
PA S S W O R D S I N D - D AY, 1 9 4 4
8
The credential market is huge
TARGE
T70M SONY
10M
EBAY
145M ADOBE
152M
HOME
DEPOT
56M
2014: 675 MILLION
RECORDS EXPOSED
IDENTITY THEFT RESOURCE CENTER
9
2015 adds to 2014’s record
OPM
22M
ANTHEM
80M
Experian
/ T-Mobile
15M
2015: 169 MILLION
MORE RECORDS EXPOSED
IDENTITY THEFT RESOURCE CENTER
11M
PREMERA
PATREON
Unknown
(15GB of passwords)
10
2015 adds to the record
exposures from 2014
FROM ONE SELLER
*
NOW 1.2 BILLION CREDENTIALS
AVAILABLE ON BLACK MARKET
*An active FBI investigation as reported by SC Magazine, November 2015
11
Protected by only
6 passwords.
1 2
3 4
5 6
PASSWORDS ARE INCREASINGLY UNRELIABLE
Consumers have an average of
24 online accounts.
1 2 3 4 5 6
7 8 9 10 11 12
13 14 15 16 17 18
19 20 21 22 23 24
21GRBlue1421GRGreen1
4
21BlackGR1414PurpleGR2
1
12
“In an era in which passwords are generally considered
inadequate, at best, it’s easy to understand why many
organizations are turning to advanced
authentication”
-PwC’s Global State of Information Security 2016
13
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
Operating System Hash of fonts
IP Address Flash execution
Browser version Plugin inventory
Language Flash 4-part vers.
Screen
Resolution
Hundreds of attributes
14
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
15
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
Biometric / Behavior
 Fingerprint scans
 Retinal, facial
scans
 Voice analysis
 Brain/heart signals
 Behavior patterns
16
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
Biometric / Behavior
 Fingerprint scans
 Retinal, facial
scans
 Voice analysis
 Brain/heart signals
 Behavior patterns
Knowledge
 Secret questions
 Captcha
 Passwords
 Pattern Matching
 Local knowledge
 Web pictographic
17
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N
 Context
 User’s goal & request
 Data sensitivity
 Geo location
Risk-Aware
 IP Address (real and implied)
 Device reputation
 Privileged access
 Vector (TOR browsers, anonymizers)
18
“ADVANCED” ACCORDING TO PwC
U S E A N Y O F F O U R M E T H O D S … . W I T H O N E I M P O R TA N T A D D I T I O N
Devices & Hardware
 PC fingerprint
based on JS
 Phones & devices
with SDKs
 Bluetooth & NFC
 Consumer IoT
 Contextual data
(geo, IP, etc.)
One-Time
Passwords
 Valid for a session
 SMS Text Push
 Mobile token
 Mobile “in-app”
 Proprietary token
 Smart cards
Biometric /
Behavior
 Fingerprint scans
 Retinal, facial
scans
 Voice analysis
 Brain/heart signals
 Behavior patterns
Knowledge
 Secret questions
 Captcha
 User details
 Pattern Matching
 Local knowledge
 Web pictographic
 User’s goal & request
 Data sensitivity
 Geo location
 IP Address (real and
implied)
Risk-Aware
 Device reputation
 Privileged access
 Language
 Patterns of usage
19
“Consumers will adopt solutions that ease the burden of
remembering passwords or carrying tokens.
Authentication must be frictionless
and easy to use.”
Suzanne Hall, Managing Director, from PwC’s
Global State of Information Security 2016
20
1
Use device
recognition to
augment passwords
and reduce friction
Device-based
authentication with
context-aware risk
assessment
becomes the norm
3
Limit the use of
passwords to high-risk
transactions and
requests only
2
iovation’s milestones on the road to passwordless
IMPROVEMENT AVOIDANCE REPLACEMEN
T
21
Something you
KNOW
Something you
HAVE
Something you
ARE
ADVANCED AUTHENTICATION REQUIRES 2 FACTORS
W H Y “ D E V I C E I D ” I S T H E F O U N D AT I O N O F A PA S S W O R D L E S S F U T U R E
22
ADVANCE AUTHENTICATION INCLUDES RISK
CONTEXT
W H E R E D O W E E X P E R I E N C E T H E G R E AT E S T R I S K ?
WEBSITE
23
RISK IN CONTEXT
W I T H D I F F E R E N T A U T H E N T I C AT I O N M E T H O D S
24
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
25
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
+10
SCORE
LOW RISK = Frictionless
Consumer Experience
SHOPPING
RESOURCES
NEWS
+10
SCORE
26
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
0
SCORE
MEDIUM RISK= Moderate
Friction
USERNAME &
PASSWORD
27
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
-10
SCORE
HIGH RISK=
Step-Up Authentication
FRAUD TEAM
28
DEVICE AUTHENTICATION WORKFLOW
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER ACCESS
+10
SCORE
0
SCORE
-10
SCORE
LOW RISK = Frictionless
Consumer Experience
MEDIUM RISK= Moderate
Friction
HIGH RISK=
Step-Up Authentication
CREDENTIAL
INPUT
CREDENTIAL
INPUT
SHOPPING
RESOURCES
NEWS
USERNAME &
PASSWORD
CREDENTIAL
INPUT
29
DEVICE CHANGE TOLERANCE
W H AT A B O U T N AT U R A L D AY- T O - D AY C H A N G E S ?
FONTSBROWSERLOCATION
EXPECTED
NOT EXPECTED
UPDATED
BROWSER
-12BROWSER
REGRESSION
+1LIMITED
TRAVEL
MULTIPLE TIME
ZONES IN 1 HOUR
Aa
30
PRECISE MATCH FUZZY MATCH
ELASTIC DEVICE MATCHING
Device Type: MACBOOK PRO Device Type: MACBOOK PRO
MINIMUM
THRESHOLD
MAXIMUM
THRESHOLD
Operating System OS X Yosemite
IP Address 22.231.113.64
Browser Safari 8.0.2
Language English
Screen Resolution 2880 x 1800
Operating System OS X Yosemite or
later
IP Address Similar Location
Browser Safari 8.0.2 or later
Language English
Screen Resolution 2880 x 1800
31
HISTORICAL
REPUTATION
SECURITY RISK
INDICATORS
LINKS AND
ASSOCIATIONS
ANOMALOUS
BEHAVIOR
AUTHORIZED
FOR ACCOUNT
32
33
HISTORICAL
REPUTATION
SECURITY RISK
INDICATORS
LINKS AND
ASSOCIATIONS
ANOMALOUS
BEHAVIOR
AUTHORIZED
FOR ACCOUNT
34
35
1. For brand managers, product owners, or web experience
managers, understand where the greatest risk is in your site
2. Understand what benefits would be realized if your customers
experienced less friction
3. Assess the impact of a device-based alternative to your
current methods of authentication
A Three-step Plan to evaluate iovation’s
Customer Authentication for your sites
36
iovation’s
Customer Authentication service wins
“Best Multi-factor Authentication Solution”
in Cyber Defense Magazine’s
2016 Editor’s Choice Awards
CONTACT US
www.iovation.com
twitter.com/iovation
Product Marketing Manager, Authentication
Michael Thelander
michael.thelander@iovation.co
m
+1 503-224-6010

Contenu connexe

Tendances

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment SystemsAmit Naik
 
October 2015 Vasco investor presention
October 2015 Vasco investor presentionOctober 2015 Vasco investor presention
October 2015 Vasco investor presentionrodrida1
 
September 2015 vasco investor presention final
September 2015 vasco investor presention finalSeptember 2015 vasco investor presention final
September 2015 vasco investor presention finalrodrida1
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar portAmar Raj
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
What Are Sound Based Payments
What Are Sound Based PaymentsWhat Are Sound Based Payments
What Are Sound Based PaymentsMahindra Comviva
 
Monster Group Product Catalogue | 2020
Monster Group Product Catalogue | 2020Monster Group Product Catalogue | 2020
Monster Group Product Catalogue | 2020Monster Group
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customerEMC
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...CSCJournals
 
Wiseasy Profile
Wiseasy Profile Wiseasy Profile
Wiseasy Profile HongAn76
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 

Tendances (20)

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
October 2015 Vasco investor presention
October 2015 Vasco investor presentionOctober 2015 Vasco investor presention
October 2015 Vasco investor presention
 
September 2015 vasco investor presention final
September 2015 vasco investor presention finalSeptember 2015 vasco investor presention final
September 2015 vasco investor presention final
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar port
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Aman PPT
Aman PPTAman PPT
Aman PPT
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
What Are Sound Based Payments
What Are Sound Based PaymentsWhat Are Sound Based Payments
What Are Sound Based Payments
 
Monster Group Product Catalogue | 2020
Monster Group Product Catalogue | 2020Monster Group Product Catalogue | 2020
Monster Group Product Catalogue | 2020
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
 
Wiseasy Profile
Wiseasy Profile Wiseasy Profile
Wiseasy Profile
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 

En vedette

El maquillaje organico 1
El maquillaje organico 1El maquillaje organico 1
El maquillaje organico 1cesar obando
 
Modélisation algorithmique d'un troupeau de moutons
Modélisation algorithmique d'un troupeau de moutonsModélisation algorithmique d'un troupeau de moutons
Modélisation algorithmique d'un troupeau de moutonsJules Collin
 
El centro como lugar de aprendizaje
El centro como lugar de aprendizajeEl centro como lugar de aprendizaje
El centro como lugar de aprendizajeCFIE de Burgos
 
Management (nouvelle mise à jour 26/09))
Management (nouvelle mise à jour 26/09))Management (nouvelle mise à jour 26/09))
Management (nouvelle mise à jour 26/09))EcoAf
 
Kb 2 resusitasi pada dewasa
Kb 2 resusitasi pada dewasaKb 2 resusitasi pada dewasa
Kb 2 resusitasi pada dewasapjj_kemenkes
 
Isu etik bidan dengan tenaga kesehatan lain kelompok 4
Isu etik bidan dengan tenaga kesehatan lain kelompok 4Isu etik bidan dengan tenaga kesehatan lain kelompok 4
Isu etik bidan dengan tenaga kesehatan lain kelompok 4Al-Ikhlas14
 
économie générale SEG (Amine nasrallah Ecoaf)
économie générale SEG (Amine nasrallah Ecoaf)économie générale SEG (Amine nasrallah Ecoaf)
économie générale SEG (Amine nasrallah Ecoaf)EcoAf
 
Rules on Clear and Effective Writing
Rules on Clear and Effective WritingRules on Clear and Effective Writing
Rules on Clear and Effective WritingJanet Tibaldo
 
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembreCommunauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembrePMI-Montréal
 
Model dan konsep teori keperawatan 1
Model dan konsep teori keperawatan 1Model dan konsep teori keperawatan 1
Model dan konsep teori keperawatan 1Nursestikes
 
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...PMI-Montréal
 
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. GilbertLe PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. GilbertPMI-Montréal
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 

En vedette (18)

El maquillaje organico 1
El maquillaje organico 1El maquillaje organico 1
El maquillaje organico 1
 
APS CFO EBOOK
APS CFO EBOOKAPS CFO EBOOK
APS CFO EBOOK
 
Oct 25 CAPHC Breakfast Symposium - Sponsored by the Nursing Network
Oct 25 CAPHC Breakfast Symposium - Sponsored by the Nursing NetworkOct 25 CAPHC Breakfast Symposium - Sponsored by the Nursing Network
Oct 25 CAPHC Breakfast Symposium - Sponsored by the Nursing Network
 
Modélisation algorithmique d'un troupeau de moutons
Modélisation algorithmique d'un troupeau de moutonsModélisation algorithmique d'un troupeau de moutons
Modélisation algorithmique d'un troupeau de moutons
 
أثر النمو السكاني على بعض قطاعات التنمية في محافظة معان
أثر النمو السكاني على بعض قطاعات التنمية في محافظة معانأثر النمو السكاني على بعض قطاعات التنمية في محافظة معان
أثر النمو السكاني على بعض قطاعات التنمية في محافظة معان
 
El centro como lugar de aprendizaje
El centro como lugar de aprendizajeEl centro como lugar de aprendizaje
El centro como lugar de aprendizaje
 
Management (nouvelle mise à jour 26/09))
Management (nouvelle mise à jour 26/09))Management (nouvelle mise à jour 26/09))
Management (nouvelle mise à jour 26/09))
 
Kb 2 resusitasi pada dewasa
Kb 2 resusitasi pada dewasaKb 2 resusitasi pada dewasa
Kb 2 resusitasi pada dewasa
 
Isu etik bidan dengan tenaga kesehatan lain kelompok 4
Isu etik bidan dengan tenaga kesehatan lain kelompok 4Isu etik bidan dengan tenaga kesehatan lain kelompok 4
Isu etik bidan dengan tenaga kesehatan lain kelompok 4
 
économie générale SEG (Amine nasrallah Ecoaf)
économie générale SEG (Amine nasrallah Ecoaf)économie générale SEG (Amine nasrallah Ecoaf)
économie générale SEG (Amine nasrallah Ecoaf)
 
Rules on Clear and Effective Writing
Rules on Clear and Effective WritingRules on Clear and Effective Writing
Rules on Clear and Effective Writing
 
Makalah etika dan hukum kesehatan
Makalah etika dan hukum kesehatanMakalah etika dan hukum kesehatan
Makalah etika dan hukum kesehatan
 
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembreCommunauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
Communauté de pratique Construction du PMI-Montréal - conférence du 5 décembre
 
Model dan konsep teori keperawatan 1
Model dan konsep teori keperawatan 1Model dan konsep teori keperawatan 1
Model dan konsep teori keperawatan 1
 
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
SYMPOSIUM 2016 : CONFÉRENCE 703 - LA GOUVERNANCE DES GRANDS PROJETS D’INFRAST...
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. GilbertLe PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
Le PMBOK 6 - Matinée du PMI-Montréal par Carl M. Gilbert
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 

Similaire à Authentifusion: Clarifying the Future of User Authentication

Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationMichael Thelander
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysTransUnion
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFATransUnion
 
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
Gartner IAM Summit 2017  | Critical Insight: How Device Insight Drives Dynami...Gartner IAM Summit 2017  | Critical Insight: How Device Insight Drives Dynami...
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...Michael Thelander
 
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20Michael Thelander
 
Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank
Risk-Based Approach to Deployment of Omnichannel Biometrics in SberbankRisk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank
Risk-Based Approach to Deployment of Omnichannel Biometrics in SberbankPriyanka Aash
 
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...TransUnion
 
Wp7 geek night intro developers - saschac
Wp7 geek night   intro developers - saschacWp7 geek night   intro developers - saschac
Wp7 geek night intro developers - saschacAberla
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Customer identity and kyc trends
Customer identity and kyc trendsCustomer identity and kyc trends
Customer identity and kyc trendsSatish Bhatia
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudTransUnion
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
Voir QR: The History, Use & Abuse of QR Codes
Voir QR: The History, Use & Abuse of QR CodesVoir QR: The History, Use & Abuse of QR Codes
Voir QR: The History, Use & Abuse of QR CodesTactica Interactive
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'TransUnion
 
Sentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationSentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationVentureBeat
 
Windows phone7 By Subodh
Windows phone7 By Subodh Windows phone7 By Subodh
Windows phone7 By Subodh Prashant Singh
 
Innovation agile deck
Innovation agile deckInnovation agile deck
Innovation agile deckAgileNetwork
 
eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal
 eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal
eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-PortalYoucef Hamadache
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...ASHOKKUMAR RAMAR
 
Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...
Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...
Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...Heroes of CRM Conference
 

Similaire à Authentifusion: Clarifying the Future of User Authentication (20)

Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer Authentication
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good Guys
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
 
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
Gartner IAM Summit 2017  | Critical Insight: How Device Insight Drives Dynami...Gartner IAM Summit 2017  | Critical Insight: How Device Insight Drives Dynami...
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
 
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
 
Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank
Risk-Based Approach to Deployment of Omnichannel Biometrics in SberbankRisk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank
Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank
 
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
 
Wp7 geek night intro developers - saschac
Wp7 geek night   intro developers - saschacWp7 geek night   intro developers - saschac
Wp7 geek night intro developers - saschac
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Customer identity and kyc trends
Customer identity and kyc trendsCustomer identity and kyc trends
Customer identity and kyc trends
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online Fraud
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
Voir QR: The History, Use & Abuse of QR Codes
Voir QR: The History, Use & Abuse of QR CodesVoir QR: The History, Use & Abuse of QR Codes
Voir QR: The History, Use & Abuse of QR Codes
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
 
Sentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationSentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition Presentation
 
Windows phone7 By Subodh
Windows phone7 By Subodh Windows phone7 By Subodh
Windows phone7 By Subodh
 
Innovation agile deck
Innovation agile deckInnovation agile deck
Innovation agile deck
 
eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal
 eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal
eSigning solutions for Front-office/Pos, Mobile on-boarding & Web-Portal
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
 
Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...
Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...
Sebastian Amtage - Beyond Marketing Automation: DMP, CDP, CMP. Who Can Still ...
 

Plus de TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 

Plus de TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 

Dernier

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 

Dernier (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 

Authentifusion: Clarifying the Future of User Authentication

  • 1. WEBINAR AUTHENTIFUSION CLARIFYING THE FUTURE OF USER AUTHENTICATION MARCH 2016 MICHAEL THELANDER Product Marketing Manager, Authentication
  • 2. 2 Understand Advanced Authentication as a multilayered approach Understand the critical relationship between Advanced Authentication and Risk Understand the role of device recognition in a “passwordless” future Provide a three-step plan to evaluate device-based authentication for your customers
  • 3. 3
  • 4. 4
  • 5. 5 PASSWORDS HAVE BEEN WITH US A LONG TIME PA S S W O R D S I N R O M A N G A R R I S O N S 1 2 3 4 5 6 7 81 0 9
  • 6. 6 PASSWORDS HAVE BEEN WITH US A LONG TIME PA S S W O R D S I N H A M L E T
  • 7. 7 PASSWORDS HAVE BEEN WITH US A LONG TIME PA S S W O R D S I N D - D AY, 1 9 4 4
  • 8. 8 The credential market is huge TARGE T70M SONY 10M EBAY 145M ADOBE 152M HOME DEPOT 56M 2014: 675 MILLION RECORDS EXPOSED IDENTITY THEFT RESOURCE CENTER
  • 9. 9 2015 adds to 2014’s record OPM 22M ANTHEM 80M Experian / T-Mobile 15M 2015: 169 MILLION MORE RECORDS EXPOSED IDENTITY THEFT RESOURCE CENTER 11M PREMERA PATREON Unknown (15GB of passwords)
  • 10. 10 2015 adds to the record exposures from 2014 FROM ONE SELLER * NOW 1.2 BILLION CREDENTIALS AVAILABLE ON BLACK MARKET *An active FBI investigation as reported by SC Magazine, November 2015
  • 11. 11 Protected by only 6 passwords. 1 2 3 4 5 6 PASSWORDS ARE INCREASINGLY UNRELIABLE Consumers have an average of 24 online accounts. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 21GRBlue1421GRGreen1 4 21BlackGR1414PurpleGR2 1
  • 12. 12 “In an era in which passwords are generally considered inadequate, at best, it’s easy to understand why many organizations are turning to advanced authentication” -PwC’s Global State of Information Security 2016
  • 13. 13 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) Operating System Hash of fonts IP Address Flash execution Browser version Plugin inventory Language Flash 4-part vers. Screen Resolution Hundreds of attributes
  • 14. 14 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards
  • 15. 15 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards Biometric / Behavior  Fingerprint scans  Retinal, facial scans  Voice analysis  Brain/heart signals  Behavior patterns
  • 16. 16 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards Biometric / Behavior  Fingerprint scans  Retinal, facial scans  Voice analysis  Brain/heart signals  Behavior patterns Knowledge  Secret questions  Captcha  Passwords  Pattern Matching  Local knowledge  Web pictographic
  • 17. 17 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … W I T H O N E I M P O R TA N T A D D I T I O N  Context  User’s goal & request  Data sensitivity  Geo location Risk-Aware  IP Address (real and implied)  Device reputation  Privileged access  Vector (TOR browsers, anonymizers)
  • 18. 18 “ADVANCED” ACCORDING TO PwC U S E A N Y O F F O U R M E T H O D S … . W I T H O N E I M P O R TA N T A D D I T I O N Devices & Hardware  PC fingerprint based on JS  Phones & devices with SDKs  Bluetooth & NFC  Consumer IoT  Contextual data (geo, IP, etc.) One-Time Passwords  Valid for a session  SMS Text Push  Mobile token  Mobile “in-app”  Proprietary token  Smart cards Biometric / Behavior  Fingerprint scans  Retinal, facial scans  Voice analysis  Brain/heart signals  Behavior patterns Knowledge  Secret questions  Captcha  User details  Pattern Matching  Local knowledge  Web pictographic  User’s goal & request  Data sensitivity  Geo location  IP Address (real and implied) Risk-Aware  Device reputation  Privileged access  Language  Patterns of usage
  • 19. 19 “Consumers will adopt solutions that ease the burden of remembering passwords or carrying tokens. Authentication must be frictionless and easy to use.” Suzanne Hall, Managing Director, from PwC’s Global State of Information Security 2016
  • 20. 20 1 Use device recognition to augment passwords and reduce friction Device-based authentication with context-aware risk assessment becomes the norm 3 Limit the use of passwords to high-risk transactions and requests only 2 iovation’s milestones on the road to passwordless IMPROVEMENT AVOIDANCE REPLACEMEN T
  • 21. 21 Something you KNOW Something you HAVE Something you ARE ADVANCED AUTHENTICATION REQUIRES 2 FACTORS W H Y “ D E V I C E I D ” I S T H E F O U N D AT I O N O F A PA S S W O R D L E S S F U T U R E
  • 22. 22 ADVANCE AUTHENTICATION INCLUDES RISK CONTEXT W H E R E D O W E E X P E R I E N C E T H E G R E AT E S T R I S K ? WEBSITE
  • 23. 23 RISK IN CONTEXT W I T H D I F F E R E N T A U T H E N T I C AT I O N M E T H O D S
  • 24. 24 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS
  • 25. 25 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS +10 SCORE LOW RISK = Frictionless Consumer Experience SHOPPING RESOURCES NEWS +10 SCORE
  • 26. 26 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS 0 SCORE MEDIUM RISK= Moderate Friction USERNAME & PASSWORD
  • 27. 27 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS -10 SCORE HIGH RISK= Step-Up Authentication FRAUD TEAM
  • 28. 28 DEVICE AUTHENTICATION WORKFLOW DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER ACCESS +10 SCORE 0 SCORE -10 SCORE LOW RISK = Frictionless Consumer Experience MEDIUM RISK= Moderate Friction HIGH RISK= Step-Up Authentication CREDENTIAL INPUT CREDENTIAL INPUT SHOPPING RESOURCES NEWS USERNAME & PASSWORD CREDENTIAL INPUT
  • 29. 29 DEVICE CHANGE TOLERANCE W H AT A B O U T N AT U R A L D AY- T O - D AY C H A N G E S ? FONTSBROWSERLOCATION EXPECTED NOT EXPECTED UPDATED BROWSER -12BROWSER REGRESSION +1LIMITED TRAVEL MULTIPLE TIME ZONES IN 1 HOUR Aa
  • 30. 30 PRECISE MATCH FUZZY MATCH ELASTIC DEVICE MATCHING Device Type: MACBOOK PRO Device Type: MACBOOK PRO MINIMUM THRESHOLD MAXIMUM THRESHOLD Operating System OS X Yosemite IP Address 22.231.113.64 Browser Safari 8.0.2 Language English Screen Resolution 2880 x 1800 Operating System OS X Yosemite or later IP Address Similar Location Browser Safari 8.0.2 or later Language English Screen Resolution 2880 x 1800
  • 32. 32
  • 34. 34
  • 35. 35 1. For brand managers, product owners, or web experience managers, understand where the greatest risk is in your site 2. Understand what benefits would be realized if your customers experienced less friction 3. Assess the impact of a device-based alternative to your current methods of authentication A Three-step Plan to evaluate iovation’s Customer Authentication for your sites
  • 36. 36 iovation’s Customer Authentication service wins “Best Multi-factor Authentication Solution” in Cyber Defense Magazine’s 2016 Editor’s Choice Awards
  • 37. CONTACT US www.iovation.com twitter.com/iovation Product Marketing Manager, Authentication Michael Thelander michael.thelander@iovation.co m +1 503-224-6010

Notes de l'éditeur

  1. 24 online accounts protected by juts 6 passwords