Transformations in Financial Technologies
The Difficult Road to a More Secure Future
AI becomes "Personal"
Gaining 360 Degree View of Consumers
Mold the technology with NetSuite to Fit the Business Needs
Rick Gemereth, CIO, Lionel LLC
The Force of Mobile and Wireless Technology: Driving Business Innovation, Increasing Productivity & Exceeding Customer Expectations
John Mason, CIO, Bottomline Technologies
VoIP Phone System Brings Exquisite Communications Makeover to MANA Products
George Alexandrou, VP & CIO, Mana Products
Business Continuity and Data Availability
Ed Toner, CIO, State of Nebraska
In Pursuit of Data Security
Microsoft Office 365, Salesforce and Workday are amongst the most used cloud applications across organizations today. The probability of the cloud applications you count on; being primarily password-protected and also having different access policies and password requirements are quite high. That is a significant cause for concern at a time when 81 percent of hacking-related data breaches are password-related.
A Multi-Factor Authentication Reduces Risks
The addition of multi-factor authentication is an important step you can take to reduce the risk of access associated with password-protected cloud apps. There are two fundamental ways that a multi-factor authentication solution integrated with your organization’s cloud applications makes data access more secure. First, it adds another layer of authentication to filter out unauthorized, unsecured and malicious access. Second, it provides IT security teams with broad visibility into access across multiple applications.
Suggested Read: Navigating the Ecosystem of Application Performance Monitoring
By Ulrica de Fort-Menares, VP of Product Strategy, LiveAction
In addition to boosting security across multiple apps, both on-premises and in the cloud, multi-factor authentication makes it more expedient for users accessing applications, and for the admins managing them. The risk-based approach to multi-factor authentication relies on data analytics, based on business context, user location, device and IP address, whether to challenge a user for further authentication of identity. If the analytics suggest a high-risk access attempt, the system can request additional authentication.
Utilizing a Risk-Based Approach Balances Security and Convenience
Instances of logging in on an unrecognized device or from an unlikely location or for the first time attempting to access a highly-sensitive resource are classified as high-risk access attempts. All multi-factor authentication solutions cannot offer a risk-based approach. Such approaches need an amalgamation of a multi-factor authentication solution that successfully combines sophisticated data analytics, the ability to recognize context, and machine learning is well worth seeking out. This is possible if you want secure access that offers robust protection for IT and convenient access for users.
You may like: Are You Analyzing the Right Data?
By Stephen Baker, CEO, Attivio