Skip to main content

Risk-Based Authentication: What's Context Got to Do with It?

November 14, 2014

With the threat landscape increasing daily, it is necessary for organizations to ensure their authentication processes are a step above. In my 7+ years of working with RSA Authentication Manager, I truly believe understanding the context around risk-based authentication is a key practice for your security efforts. In the post "Risked-Based Authentication: What's Context Got to Do with It," the team from RSA explains how security technologies that take contextual data and potential consequences into account can help make intelligent, timely decisions.

"In the dynamic world in which we live, context is everything.  This holds true in the online world, too.  In our everyday lives, we constantly make decisions based on contextual data and potential consequences. Why shouldn’t our security technologies make decisions in similar, intelligent ways?  

As attackers adapt their methods and continue to steal mass batches of login credentials, static usernames and passwords provide little assurance of the true identity of the user behind the password. As a result, context-aware user authentication has become a necessary weapon in the battle to protect online identities. To be effective in today’s world, our authentication methods must be able to understand the context of a login attempt, analyze that context to determine risk and adapt requirements accordingly. This is precisely the goal of risk-based authentication." 

 

 

Related Blogs

May 30, 2018

Phishing - The Rest of the Story

Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this b...

See Details

April 20, 2018

Customization of IAM Solutions: Risks of Having it Your Way

Forty years ago Burger King launched a revolution in customization, declaring that they could provide you the power of creating your perfect burger co...

See Details

December 18, 2017

Security vs. End User Experience – Find the Balance

Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the organ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

RELATED INSIGHTS

January 26, 2018

Identity and Access Management Solutions

We help you minimize risk and maximize efficiency with our IAM solutions.

See Details

May 23, 2016

Next Generation Identity and Access Management (Next Gen IAM)

Having spent the last 17 years in the identity and access management (IAM) space, I know two things are certain: Evolution is inevitable, and change i...

See Details

June 09, 2017

Identity and Access Management: Why Identity Matters

Learn why identity matters to your organization and how it can have a positive impact on your security program.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.