Transcript

Context Based Authentication

THE DATA afe PROTECTION COMPANY Context Based Authentication Convenient, Cost-Effective Secure Remote Access START START Stella Jeff O Device registration M Device type M User history / behavior pattern V Network / geo location V Access time V Working hours V IP address V Device registration V Device type M User history / behavior pattern V Network / geo location M Access time V Working hours M IP address RISK ACCESS GRANTED ASSESSMENT Pit Stop Protected Resources → Web-based portals → Saas applications Stella is reguested to provide a passcode that has been sent to her → SSL VPNS mobile phone. → Outlook Web Mail (OWA) → SharePoint STEP-UP AUTHENTICATION → Applications that support SAML Stella taps the passcode on to the iPad and is granted access ACCESS GRANTED Convenient, Cost-Effective Secure Remote Access Tokenless Authentication • Easy to use for users Easy to manage for administration • Lower TCO • Reduce administration costs • Eliminate hardware token costs • Fast and Secure • Quick direct access • Quick step up action in high risk FINISH

Context Based Authentication

shared by SafeNet on Sep 09
1,261 views
1 shares
0 comments
Next-Generation Authentication: Walk the Security Tightrope without Losing Your Balance

Publisher

SafeNet Inc

Tags

None.

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size