the consumerization of authentication with iovation
TRANSCRIPT
WEBINAR
THE CONSUMERIZATION OF AUTHENTICATION
MARCH 2017
MICHAEL THELANDER, DIRECTOR PRODUCT MARKETING
2
Y O U R H O S TM I C H A E L T H E L A N D E R , D I R E C T O R P R O D U C T M K T G
n Articles have appeared in IT Professional Magazine, CyberDefense Magazine, SoftwareCEO .com and others
n 25 years product management and marketing, the last 10 in information security Currently drives market and customer research initiatives
n Responsible for new product introductions and training
n Facilitates the ongoing relationship between engineering, product management, and our iovation subscribers
WHO
con·sum·er·i·za·tion“The reorientation of product and
service designs to focus on the end user as an individual consumer, in contrast with an
earlier era of organization-oriented offerings.”
10
Scalen 5,000 – 10,000
employees is considered “large”
n 500K to 5 million customers is considered “large”
n On-prem servers still the “standard” for the modern enterprise
Usability n Employees tend to
do what we ask them to do
n Customers are rarely incented to do what we ask them to do “just ”because
n They know what “better” looks like
Diversityn Solutions are
needed for multiple kinds of technology
n All our employees could fit into 2 or3 demographics…
n Our customers may fit into 6 or 12 demographics
T H E C H A L L E N G E S W I T H E N T E R P R I S E M O D E L S“ W H Y C A N ’ T W E J U S T D O W H A T W E ’ R E D O I N G F O R T H E E N T E R P R I S E ? ”
13
D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E
Lightweight user-friendly authentication
More robust, multifactor authentication
Real-time, interactive authorization
14
D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E
Lightweight user-friendly authentication
More robust, multifactor authentication
Real-time, interactive authorization
15
D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E
Lightweight user-friendly authentication
More robust, multifactor authentication
Real-time, interactive authorization
16
D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E
Lightweight user-friendly authentication
More robust, multifactor authentication
Real-time, interactive authorization
17
D Y N A M I C A U T H E N T I C A T I O NR I S K - A P P R O P R I A T E A U T H E N T I C A T I O N B A L A N C E S S E C U R I T Y & E X P E R I E N C E
Lightweight user-friendly authenticationDevice-based Authentication
More robust, multifactor authenticationMobile Multifactor Authentication
Real-time, interactive authorizationMulti-party Authorization
19
W H A T D O W E M E A N B Y “ D E V I C E - B A S E D ” ? I D E N T I F Y A U S E R B A S E D O N A S T O R E D D E V I C E F I N G E R P T I N T
Transparent device-based authentication eliminates friction for most users
Turns your customer’s mobile device into a reliable possession factor
Machine learning continuously assesses devices
Highlights the risk context of any device
Adaptive, contextual response drives step-up authentication and subsequent actions
MINIMUM THRESHOLD
MAXIMUM THRESHOLD
Original Device Print
Returning Device Print
1
20
W H A T D O W E M E A N B Y “ M U L T I F A C T O R ” ? M O B I L E - B A S E D A U T H E N T I C A T I O N T H A T D E L I V E R S A V A R I E T Y O F F A C T O R S
Something you
KNOWSomething you
HAVESomething you
ARE
The image part with relationship ID rId2 was not found in the file.
The image part with relationship ID rId2 was not found in the file.
The image part with relationship ID rId2 was not found in the file.
2
21
W H A T D O W E M E A N B Y “ A U T H O R I Z A T I O N ” ? A P A R T F R O M A U T H E N T I C A T I O N
I agree YOU ARE who you say you
are….
But are you AUTHORIZEDto do what
you’re asking to do?
3
24
T H E C O N S U M E R J O U R N E YD I F F E R E N T A U T H E N T I C A T I O N F O R D I F F E R E N T L E V E L S O F R I S K
Transparent DEVICE-BASED AUTHENTICATION SERVICE
InteractiveMOBILE MULTIFACTOR AUTHENTICATION
Real-timeEXPLICIT AUTHORIZATION
26
The image part with relationship ID rId4 was not found in the file.
EVASION
IP ADDRESS
JAILBROKEN
The image part with relations
GEOLOCATION
The image part with relationship ID rId4
SECURITY RISK
The image part with relationship ID rId4 was not found in
ASSOCIATIONS
The image part with relationship ID rId4 was not found in the file.
The image part with relationship ID rId4 was not found in the file.
The image part with relationshi
The image part with relationship ID rId4 was not found in the file.
INITIAL REGISTRATION AUTHENTICATED
The image
The image
The image
The
The
The
30
TransparentDEVICE-BASED AUTHENTICATION SERVICE
InteractiveMOBILE MULTIFACTOR AUTHENTICATION
Real-timeEXPLICIT AUTHORIZATION
32
Real-timeAuthorization
The image part with relationship ID rId4 was not found in the file.
For MultipleAuthorizers
The image part with relationship ID rId4 was not found in the file.
OR
A U T H O R I Z E I N D I V I D U A L O R G R O U P T R A N S A C T I O N S
33
CLEARKEYDEVICE-BASED AUTHENTICATION SERVICE
LAUNCHKEYMOBILE MULTIFACTOR AUTHENTICATION
LAUNCHKEYEXPLICIT AUTHORIZATION
Enabling The Right Method for Every Level of Risk
The image part with
The image part with
35
N F CN E A R - F I E L D C O M M U N I C A T I O N S
n Wells Fargo, JP Morgan Chase and Bank of America are all experimenting with cardless ATMs
n They use Near Field Communications protocols to link a phone that’s within 6cm
n Tests have begin in selected cities
36
B E H A V I O M E T R I C SC O M B I N I N G B I O M E T R I C A N D B E H A V I O R A L
n Biometrics by itself is not enough (the reason we add context through ClearKey)
n Behavioral indicators are another kind of context that can separate ”trusted” from “suspicious” users
37
n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication
n Powered by the context –device and session – that’s shared between these use cases
C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N
©2016 Gartner, Inc. Used with permission
38
n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication
n Powered by the context –device and session – that’s shared between these use cases
C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N
©2016 Gartner, Inc. Used with permission
39
n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication
n Powered by the context –device and session – that’s shared between these use cases
C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N
©2016 Gartner, Inc. Used with permission
40
n Gartner’s vision for a unification of ID proofing, fraud detection, and authentication
n Powered by the context –device and session – that’s shared between these use cases
C O N V E R G E N C EA U T H E N T I C A T I O N , I D E N T I T Y P R O O F I N G A N D F R A U D D E T E C T I O N
©2016 Gartner, Inc. Used with permission
CONTACT US
www.iovation.com
twitter.com/TheOtherMichael
DIRECTOR PRODUCT MARKETING
MICHAEL THELANDER
503.943.6700