
Context Based Authentication
THE DATA afe PROTECTION COMPANY Context Based Authentication Convenient, Cost-Effective Secure Remote Access START START Stella Jeff O Device registration M Device type M User history / behavior pattern V Network / geo location V Access time V Working hours V IP address V Device registration V Device type M User history / behavior pattern V Network / geo location M Access time V Working hours M IP address RISK ACCESS GRANTED ASSESSMENT Pit Stop Protected Resources → Web-based portals → Saas applications Stella is reguested to provide a passcode that has been sent to her → SSL VPNS mobile phone. → Outlook Web Mail (OWA) → SharePoint STEP-UP AUTHENTICATION → Applications that support SAML Stella taps the passcode on to the iPad and is granted access ACCESS GRANTED Convenient, Cost-Effective Secure Remote Access Tokenless Authentication • Easy to use for users Easy to manage for administration • Lower TCO • Reduce administration costs • Eliminate hardware token costs • Fast and Secure • Quick direct access • Quick step up action in high risk FINISH
Context Based Authentication
Source
Unknown. Add a sourceCategory
TechnologyGet a Quote