the consumerization of authentication with iovation

42
WEBINAR THE CONSUMERIZATION OF AUTHENTICATION MARCH 2017 MICHAEL THELANDER, DIRECTOR PRODUCT MARKETING

Upload: iovation

Post on 22-Mar-2017

105 views

Category:

Software


1 download

TRANSCRIPT

WEBINAR

THE CONSUMERIZATION OF AUTHENTICATION

MARCH 2017

MICHAEL THELANDER, DIRECTOR PRODUCT MARKETING

2

Y O U R H O S TM I C H A E L T H E L A N D E R , D I R E C T O R P R O D U C T M K T G

n Articles have appeared in IT Professional Magazine, CyberDefense Magazine, SoftwareCEO .com and others

n 25 years product management and marketing, the last 10 in information security Currently drives market and customer research initiatives

n Responsible for new product introductions and training

n Facilitates the ongoing relationship between engineering, product management, and our iovation subscribers

AGENDA

3

CONSUMERIZATION?

A LAYERED APPROACH

THE CONSUMER JOURNEY

PROMISING TECHNOLOGIES

CONSUMERIZATION

WHO

con·sum·er·i·za·tion“The reorientation of product and

service designs to focus on the end user as an individual consumer, in contrast with an

earlier era of organization-oriented offerings.”

WHO

June 2016

“…proactively advancing your security …. strong authentication technologies…”

WHO

WHO

“Hello. It’s me”.

WHO95%

82%

82%

64%

P R E V I E W : A I T E G R O U P R E P O R T 2 0 1 7

10

Scalen 5,000 – 10,000

employees is considered “large”

n 500K to 5 million customers is considered “large”

n On-prem servers still the “standard” for the modern enterprise

Usability n Employees tend to

do what we ask them to do

n Customers are rarely incented to do what we ask them to do “just ”because

n They know what “better” looks like

Diversityn Solutions are

needed for multiple kinds of technology

n All our employees could fit into 2 or3 demographics…

n Our customers may fit into 6 or 12 demographics

T H E C H A L L E N G E S W I T H E N T E R P R I S E M O D E L S“ W H Y C A N ’ T W E J U S T D O W H A T W E ’ R E D O I N G F O R T H E E N T E R P R I S E ? ”

WHO

A LAYERED APPROACHNOT EVERY AUTHENTICATION REQUEST IS THE SAME

13

D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E

Lightweight user-friendly authentication

More robust, multifactor authentication

Real-time, interactive authorization

14

D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E

Lightweight user-friendly authentication

More robust, multifactor authentication

Real-time, interactive authorization

15

D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E

Lightweight user-friendly authentication

More robust, multifactor authentication

Real-time, interactive authorization

16

D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E

Lightweight user-friendly authentication

More robust, multifactor authentication

Real-time, interactive authorization

17

D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E

Lightweight user-friendly authenticationDevice-based Authentication

More robust, multifactor authenticationMobile Multifactor Authentication

Real-time, interactive authorizationMulti-party Authorization

WHO

Definitions

19

W H A T D O W E M E A N B Y “ D E V I C E - B A S E D ” ? I D E N T I F Y A U S E R B A S E D O N A S T O R E D D E V I C E F I N G E R P T I N T

Transparent device-based authentication eliminates friction for most users

Turns your customer’s mobile device into a reliable possession factor

Machine learning continuously assesses devices

Highlights the risk context of any device

Adaptive, contextual response drives step-up authentication and subsequent actions

MINIMUM THRESHOLD

MAXIMUM THRESHOLD

Original Device Print

Returning Device Print

1

20

W H A T D O W E M E A N B Y “ M U L T I F A C T O R ” ? M O B I L E - B A S E D A U T H E N T I C A T I O N T H A T D E L I V E R S A V A R I E T Y O F F A C T O R S

Something you

KNOWSomething you

HAVESomething you

ARE

The image part with relationship ID rId2 was not found in the file.

The image part with relationship ID rId2 was not found in the file.

The image part with relationship ID rId2 was not found in the file.

2

21

W H A T D O W E M E A N B Y “ A U T H O R I Z A T I O N ” ? A P A R T F R O M A U T H E N T I C A T I O N

I agree YOU ARE who you say you

are….

But are you AUTHORIZEDto do what

you’re asking to do?

3

22

THE CONSUMER JOURNEY

24

T H E C O N S U M E R J O U R N E YD I F F E R E N T A U T H E N T I C A T I O N F O R D I F F E R E N T L E V E L S O F R I S K

Transparent DEVICE-BASED AUTHENTICATION SERVICE

InteractiveMOBILE MULTIFACTOR AUTHENTICATION

Real-timeEXPLICIT AUTHORIZATION

25

TransparentDEVICE-BASED AUTHENTICATION SERVICE

26

The image part with relationship ID rId4 was not found in the file.

EVASION

IP ADDRESS

JAILBROKEN

The image part with relations

GEOLOCATION

The image part with relationship ID rId4

SECURITY RISK

The image part with relationship ID rId4 was not found in

ASSOCIATIONS

The image part with relationship ID rId4 was not found in the file.

The image part with relationship ID rId4 was not found in the file.

The image part with relationshi

The image part with relationship ID rId4 was not found in the file.

INITIAL REGISTRATION AUTHENTICATED

The image

The image

The image

The

The

The

27

TransparentDEVICE-BASED AUTHENTICATION SERVICE

InteractiveMOBILE MULTIFACTOR AUTHENTICATION

28

The image part with relationship ID rId6 was not found in the file.

29

The image part with relationship ID rId9 was not found in the file.

30

TransparentDEVICE-BASED AUTHENTICATION SERVICE

InteractiveMOBILE MULTIFACTOR AUTHENTICATION

Real-timeEXPLICIT AUTHORIZATION

31

The image part with relationship ID rId10 was not found in the file.

32

Real-timeAuthorization

The image part with relationship ID rId4 was not found in the file.

For MultipleAuthorizers

The image part with relationship ID rId4 was not found in the file.

OR

A U T H O R I Z E I N D I V I D U A L O R G R O U P T R A N S A C T I O N S

33

CLEARKEYDEVICE-BASED AUTHENTICATION SERVICE

LAUNCHKEYMOBILE MULTIFACTOR AUTHENTICATION

LAUNCHKEYEXPLICIT AUTHORIZATION

Enabling The Right Method for Every Level of Risk

The image part with

The image part with

PROMISING CONCEPTS

35

N F CN E A R - F I E L D C O M M U N I C A T I O N S

n Wells Fargo, JP Morgan Chase and Bank of America are all experimenting with cardless ATMs

n They use Near Field Communications protocols to link a phone that’s within 6cm

n Tests have begin in selected cities

36

B E H A V I O M E T R I C SC O M B I N I N G B I O M E T R I C A N D B E H A V I O R A L

n Biometrics by itself is not enough (the reason we add context through ClearKey)

n Behavioral indicators are another kind of context that can separate ”trusted” from “suspicious” users

37

n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication

n Powered by the context –device and session – that’s shared between these use cases

C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N

©2016 Gartner, Inc. Used with permission

38

n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication

n Powered by the context –device and session – that’s shared between these use cases

C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N

©2016 Gartner, Inc. Used with permission

39

n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication

n Powered by the context –device and session – that’s shared between these use cases

C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N

©2016 Gartner, Inc. Used with permission

40

n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication

n Powered by the context –device and session – that’s shared between these use cases

C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N

©2016 Gartner, Inc. Used with permission

41

Webinar March 28 | 7 & 10 AM PT

CONTACT US

www.iovation.com

twitter.com/TheOtherMichael

DIRECTOR PRODUCT MARKETING

MICHAEL THELANDER

[email protected]

503.943.6700