SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
CIOREVIEW.COM
CIOReviewMARCH - 2014
T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s
THREATMETRIX:
PIONEERING CONTEXT-BASED
WORKFORCE AUTHENTICATION
THREATMETRIX:
PIONEERING CONTEXT-BASED
WORKFORCE AUTHENTICATION
Reed Taussig,
President & CEO,
ThreatMetrix
$10
| |March 2014
3CIOReview| |March 2014
2CIOReview
T
he consumerization of IT is well underway. The
network perimeter has virtually disappeared, a
modern workforce connects from inside and
outside of the corporate firewall to both on-
premise and cloud-hosted applications. As BYOD is now a
business reality, corporate IT has lost visibility and control
over the devices that employees and contractors use to access
both critical and non-critical applications.
In this fast-changing IT environment, traditional access
security controls are increasingly archaic and unworkable.
Today employees accessing mission-critical applications look
like consumers on ecommerce websites. Enterprise security
practitioners must find new approaches for securing access
to corporate applications to address a major source of risk.
ThreatMetrix™ is helping businesses apply techniques of
context-based authentication and federated trust to address
the growing problem of remote workforce authentication.
Gartner estimates that by year end 2016, more than 30
percent of enterprises will use contextual authentication for
remote workforce remote access. [Source: Gartner Magic
Quadrant for User Authentication, December, 2013]
TheChallengeofRemoteWorkforceAccess
Remote workforce logins are open to the same types of
misuse and abuse as consumer-based applications with
potentially far greater business risk. A cybercriminal logging
into an e m p l o y e e ’ s
account using stolen credentials can do far greater damage to
a company than a customer using a stolen credit card.
“Endpoint trustworthiness is especially poignant for
bring-your-own-device (BYOD) scenarios. In such cases,
the enterprise may not use mobile device management
(MDM) software to help secure workforce mobile devices. As
a result, employee phones and tablets may look very much
like consumer devices, and it's important to decide how
much to trust the user and the credentials and the contextual
information that they're presenting.” [Source: “Adaptive
Access Control Brings Together Identity, Risk and Context,”
Gartner: Trent Henry, August 2013]
Enterprise security professionals must walk a fine line
when it comes to securing workforce access to applications.
On the one hand, mitigating the risks of data breaches is a
top priority – no company wants to end up on the front page
of The Wall Street Journal as a high profile data breach.
On the other hand, security must be balanced with the
user experience. Time-consuming authentication techniques
erode overall productivity. Worse, the more onerous the
security measures, the more motivated the workforce will be
to find ways around them.
Traditionally, companies lock down remote logins by
deploying VPNs, requiring employees and partners to use
corporate-issued equipment, or issuing hardware tokens or
one-time passwords (OTP) for strong authentication. These
methods are getting more and more impracticable in today’s
“consumerized” IT environment.
Context-BasedAuthenticationandFederatedTrust
ThreatMetrix offers an alternative to traditional
workforce authentication models, leveraging a
shared trust intelligence network that currently
protects more than 2,500 financial services
and e-commerce companies from global
cybercriminal rings.
ThreatMetrix offers real-time
technologies that analyze online
personas, employee devices,
transactional or application
context and employee
behavior. As a passive,
network-based solution
delivered from the cloud,
ThreatMetrix is capable of
recognizing all employee-
supplied devices, whether
they have authenticated
in the past or not. A
global policy engine lets
Cover Story
ThreatMetrix:
PioneeringContext-Based
WorkforceAuthenticationReed Taussig,
President & CEO, ThreatMetrix
By Christo Jacob
| |March 2014
5CIOReview| |March 2014
4CIOReview
defense against these global forces is a
global network.
From its inception in 2005,
ThreatMetrix has been developing a
global network in the fight against
cybercrime. Supporting over 2,500 of
the world’s largest Internet retailers,
financial institutions and social
networking sites, ThreatMetrix has
built a federated trust network that
examines tens of millions of employee
and customer logins and account
registrations every day. Using the power
of shared intelligence across more than
10,000 customer websites ThreatMetrix
provides the largest federated trust
network in the world.
All of the devices, personas and
transactions that take place across the
customers’ websites in the ThreatMetrix
network are shared as part of the
ThreatMetrix™GlobalTrustIntelligence
Network (The Network). Data on The
Network includes device identification
characteristics, user and persona profiles,
behavior, detected relationships and
threat assessments. This massive data set
is refreshed and analyzed continuously
to identify emerging threats.
All ThreatMetrix customers
contribute value by sharing anonymous
data with the Network. In turn, all
participants of the Network benefit
from the global insight developed by
the network. To protect user privacy,
all of a business’ data is encrypted and
anonymized before being sent to the
globalnetwork.WithintheThreatMetrix
platform, multi-level encryption ensures
that data remains private between all the
participants in the network, including
ThreatMetrix.
“It is the power of The Network
that provides our customers with this
reliable and cost-effective solution,”
said Reed Taussig, President and CEO
of ThreatMetrix. “Rather than deriving
decision data from a single enterprise,
ThreatMetrix customers share
anonymous data globally. This increases
the perspective, quality and value of the
data while driving down the cost to the
enterprise.”
ExtendingthePoweroftheNetwork
Withhundredsofmillionsoftransactions
available each month, ThreatMetrix is
using “big data” techniques to mine this
information for insight that benefits all
of its customers, as well as the Internet
as a whole.
One can see the real-time analysis
of fraud attempts detected throughout
the global network on the ThreatMetrix
Web Fraud Map.
For businesses looking to reduce
the threat of data breaches from
unauthorized application access,
combining context-based authentication
with a global federated identity network
is the most flexible and cost-effective way
to increase security while reducing the
cost and friction for workforce access.
businesses define specific and appropriate
risk and access policies. Using
ThreatMetrix, businesses can tag trusted
combinations of credentials and identify
indicators of risk learned from a global
network of online identities, transactions
and data.
By analyzing the contextual
information from the login and
comparing it to data from a global
network, ThreatMetrix can help business
reduce the risks of remote login without
burdening the user.
“Enterprise adaptive access control
combines contextual information and user
credentials to evaluate the risk of users
attempting to access resources. Once the
purview of e- commerce and financial
services, adaptive access is finding an
increased role in workforce identity —
particularly for mobile device use cases.”
[Source: “AdaptiveAccess Control Brings
Together Identity, Risk and Context,”
Gartner: Trent Henry, August 2013]
Context-based authentication has two
essential benefits for the enterprise:
• Frictionless access: Real-time, passive
assessment of the login context gives
businesses the ability to streamline access
for known and trusted combinations of
logins and devices – reducing effort and
inconvenience for the workforce.
• Increased security: Combining global
federated trusted identities with context-
based authentication helps businesses
quickly and easily identify high-risk
connections that have the potential to
compromise data. This includes devices
that are part of botnets, devices associated
with many different unregistered
credentials that are used to conceal true
identity or devices that are known to be
involved with fraudulent access across the
ThreatMetrix global network.
TheFrictionlessLogin
A typical implementation works like this:
1. The first time an employee logs into
a sensitive application such as a financial
system, ThreatMetrix creates a profile
of the incoming user. The individual
is prompted to perform step-up
authentication, perhaps using an OTP
sent to their registered mobile phone. At
this point, ThreatMetrix tags that trusted
combination of device and account for
future reference.
2. The next time that employee logs in,
the ThreatMetrix platform does a real-
time analysis for any threats (malware,
etc.) and identifies the trusted online
identity. This is transparent to the
employee.
3. If the employee gets a new laptop
or tablet and that device has been
authenticated with appropriate and
acceptable credentials anywhere across
the ThreatMetrix network, the enterprise
can choose how to address the situation:
accept those credentials without
challenge or execute a challenge to further
authenticate that user’s credentials.
Every transaction is screened for other
indicators of risk, including malware,
botnets and behavioral risk factors.
4. Combining real-time contextual
authentication with federated trusted
identity data derived from the
ThreatMetrix network provides seamless,
reliable identification of user credentials
without the need to install and maintain
MDM, token or other device-specific
solutions.
Using this process, businesses can
detect anomalies and keep hackers out
while streamlining legitimate workforce
connection. It can also detect anomalous
behavior that might indicate an insider
threat, such as unauthorized password
sharing that puts regulatory compliance
at risk.
BenefitingfromtheNetworkEffect
The power of the ThreatMetrix solution
comes not only from its technologies, but
also from the data it collects and analyzes
across its global network.
The forces arrayed against the
enterprise are growing in size and
sophistication. A few years ago most
data breach attempts came from clumsy
phishing emails and opportunistic,
individual hackers. Today’s online
threat environment is characterized
by well-organized and well-financed
cyber-terrorist rings and crowd-sourced
malware and botnets. The only viable
When it comes to context-based
authentication, the larger the
network, the greater the chance
that you can identify and exclude
potential threats – including the
organized cybercrime or crowd-
sourced malware targeting busi-
nesses.
The Global Trust Intelligence
Network (The Network) includes
many of the world’s largest Inter-
net retailers, financial institutions
and social networking sites.
The Network is massive and
growing rapidly. As of the begin-
ning of 2014, more than 2,500
businesses worldwide share in-
formation about transactions
generated on more than 10,000
websites, tracking over 160 million
active user accounts.
Networks: Size Does Matter
Context-based
authenticationis
gainingtraction
becauseitaddresses
twoconvergingtrends–
theescalatingneedfor
establishingtrustonthe
Internet,coupledwith
concernsaboutprivacy
inanageofmassivedata
collection
- ReedTaussig, President & CEO,ThreatMetrix
Traditional strong authentication measures often require you to give up more
personal information to tie your online identity with a real-world identity. But
revealing personal information to more entities puts online privacy at greater
risk, as attackers and criminals target the repositories of that data.
The Global Trust Intelligence Network (The Network) is carefully
designed to protect the security and privacy of all data in the network. While
your business has the information about exactly who is linked to each login,
that data is anonymized before it becomes part of the network.
ThreatMetrix tracks the behavior of a person online, without needing
to know exactly who the person is. It is both passive and anonymous from
the user perspective. This anonymous data can be shared throughout the
global network without revealing information about the persona’s real-world
identity.
“Context-based authentication is gaining traction because it addresses
two converging trends – the escalating need for establishing trust on the
Internet, coupled with concerns about privacy in an age of massive data
collection,” says Taussig. “With context-based authentication, you don’t have
to sacrifice privacy in the name of online security.”
Protecting Personal Privacy
ThreatMetrix Global Trust Intelligence Network
Using the power of shared intelligence across more than 2,500 customers and 10,000 websites, the ThreatMetrix™
Global Trust Intelligence Network provides the largest federated trust network in the world.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET Journal
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
SecuritĂŠ : Le rapport 2Q de la X-Force
SecuritĂŠ : Le rapport 2Q de la X-ForceSecuritĂŠ : Le rapport 2Q de la X-Force
SecuritĂŠ : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential InformationKim Jensen
 

Was ist angesagt? (19)

Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
SecuritĂŠ : Le rapport 2Q de la X-Force
SecuritĂŠ : Le rapport 2Q de la X-ForceSecuritĂŠ : Le rapport 2Q de la X-Force
SecuritĂŠ : Le rapport 2Q de la X-Force
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 

Andere mochten auch

CMOs in Flux
CMOs in FluxCMOs in Flux
CMOs in FluxGary Slack
 
Party Hard Drivers
Party Hard DriversParty Hard Drivers
Party Hard Driversgautam20992001
 
Web-to-Print Roundtable
Web-to-Print RoundtableWeb-to-Print Roundtable
Web-to-Print RoundtableJoe Kern
 
Going Beyond Customer Loyalty
Going Beyond Customer LoyaltyGoing Beyond Customer Loyalty
Going Beyond Customer LoyaltyJoe Kern
 
Seven steps to effective lead nurturing
Seven steps to effective lead nurturingSeven steps to effective lead nurturing
Seven steps to effective lead nurturingJoe Kern
 
Screenplay Crowd Sourcing
Screenplay Crowd SourcingScreenplay Crowd Sourcing
Screenplay Crowd Sourcingrbucks
 
CMOs in Flux
CMOs in FluxCMOs in Flux
CMOs in FluxGary Slack
 
GLGA Illinois Sales Tax Webinar
GLGA Illinois Sales Tax WebinarGLGA Illinois Sales Tax Webinar
GLGA Illinois Sales Tax WebinarJoe Kern
 
Building sales with Web to Print
Building sales with Web to PrintBuilding sales with Web to Print
Building sales with Web to PrintJoe Kern
 
Huong dan su dung joomla 1.5
Huong dan su dung joomla 1.5Huong dan su dung joomla 1.5
Huong dan su dung joomla 1.5KID_2603
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix
 
Generating Print Sales Leads with LinkedIn session 1
Generating Print Sales Leads with LinkedIn session 1Generating Print Sales Leads with LinkedIn session 1
Generating Print Sales Leads with LinkedIn session 1Joe Kern
 
Crowd Sourcing for Screenplays
Crowd Sourcing for ScreenplaysCrowd Sourcing for Screenplays
Crowd Sourcing for Screenplaysrbucks
 
Helping Children with Visual Impairments Explore, Learn and Communicate Using...
Helping Children with Visual Impairments Explore, Learn and Communicate Using...Helping Children with Visual Impairments Explore, Learn and Communicate Using...
Helping Children with Visual Impairments Explore, Learn and Communicate Using...Julie Johnson
 
Selling Based on Personalities
Selling Based on PersonalitiesSelling Based on Personalities
Selling Based on PersonalitiesJoe Kern
 
My Favorite Marketing Definitions
My Favorite Marketing DefinitionsMy Favorite Marketing Definitions
My Favorite Marketing DefinitionsGary Slack
 

Andere mochten auch (17)

CMOs in Flux
CMOs in FluxCMOs in Flux
CMOs in Flux
 
Party Hard Drivers
Party Hard DriversParty Hard Drivers
Party Hard Drivers
 
Web-to-Print Roundtable
Web-to-Print RoundtableWeb-to-Print Roundtable
Web-to-Print Roundtable
 
Going Beyond Customer Loyalty
Going Beyond Customer LoyaltyGoing Beyond Customer Loyalty
Going Beyond Customer Loyalty
 
Seven steps to effective lead nurturing
Seven steps to effective lead nurturingSeven steps to effective lead nurturing
Seven steps to effective lead nurturing
 
Terrorism rsm
Terrorism rsmTerrorism rsm
Terrorism rsm
 
Screenplay Crowd Sourcing
Screenplay Crowd SourcingScreenplay Crowd Sourcing
Screenplay Crowd Sourcing
 
CMOs in Flux
CMOs in FluxCMOs in Flux
CMOs in Flux
 
GLGA Illinois Sales Tax Webinar
GLGA Illinois Sales Tax WebinarGLGA Illinois Sales Tax Webinar
GLGA Illinois Sales Tax Webinar
 
Building sales with Web to Print
Building sales with Web to PrintBuilding sales with Web to Print
Building sales with Web to Print
 
Huong dan su dung joomla 1.5
Huong dan su dung joomla 1.5Huong dan su dung joomla 1.5
Huong dan su dung joomla 1.5
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
Generating Print Sales Leads with LinkedIn session 1
Generating Print Sales Leads with LinkedIn session 1Generating Print Sales Leads with LinkedIn session 1
Generating Print Sales Leads with LinkedIn session 1
 
Crowd Sourcing for Screenplays
Crowd Sourcing for ScreenplaysCrowd Sourcing for Screenplays
Crowd Sourcing for Screenplays
 
Helping Children with Visual Impairments Explore, Learn and Communicate Using...
Helping Children with Visual Impairments Explore, Learn and Communicate Using...Helping Children with Visual Impairments Explore, Learn and Communicate Using...
Helping Children with Visual Impairments Explore, Learn and Communicate Using...
 
Selling Based on Personalities
Selling Based on PersonalitiesSelling Based on Personalities
Selling Based on Personalities
 
My Favorite Marketing Definitions
My Favorite Marketing DefinitionsMy Favorite Marketing Definitions
My Favorite Marketing Definitions
 

Ähnlich wie ThreatMetrix Profile in March 2014 CIO Review

“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information securityAhmed Banafa
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issueSonaliG6
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?Ahmed Banafa
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfforladies
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 

Ähnlich wie ThreatMetrix Profile in March 2014 CIO Review (20)

“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
digital marketing
digital marketingdigital marketing
digital marketing
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 

KĂźrzlich hochgeladen

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 

KĂźrzlich hochgeladen (20)

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

ThreatMetrix Profile in March 2014 CIO Review

  • 1. CIOREVIEW.COM CIOReviewMARCH - 2014 T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s THREATMETRIX: PIONEERING CONTEXT-BASED WORKFORCE AUTHENTICATION THREATMETRIX: PIONEERING CONTEXT-BASED WORKFORCE AUTHENTICATION Reed Taussig, President & CEO, ThreatMetrix $10
  • 2. | |March 2014 3CIOReview| |March 2014 2CIOReview T he consumerization of IT is well underway. The network perimeter has virtually disappeared, a modern workforce connects from inside and outside of the corporate firewall to both on- premise and cloud-hosted applications. As BYOD is now a business reality, corporate IT has lost visibility and control over the devices that employees and contractors use to access both critical and non-critical applications. In this fast-changing IT environment, traditional access security controls are increasingly archaic and unworkable. Today employees accessing mission-critical applications look like consumers on ecommerce websites. Enterprise security practitioners must find new approaches for securing access to corporate applications to address a major source of risk. ThreatMetrix™ is helping businesses apply techniques of context-based authentication and federated trust to address the growing problem of remote workforce authentication. Gartner estimates that by year end 2016, more than 30 percent of enterprises will use contextual authentication for remote workforce remote access. [Source: Gartner Magic Quadrant for User Authentication, December, 2013] TheChallengeofRemoteWorkforceAccess Remote workforce logins are open to the same types of misuse and abuse as consumer-based applications with potentially far greater business risk. A cybercriminal logging into an e m p l o y e e ’ s account using stolen credentials can do far greater damage to a company than a customer using a stolen credit card. “Endpoint trustworthiness is especially poignant for bring-your-own-device (BYOD) scenarios. In such cases, the enterprise may not use mobile device management (MDM) software to help secure workforce mobile devices. As a result, employee phones and tablets may look very much like consumer devices, and it's important to decide how much to trust the user and the credentials and the contextual information that they're presenting.” [Source: “Adaptive Access Control Brings Together Identity, Risk and Context,” Gartner: Trent Henry, August 2013] Enterprise security professionals must walk a fine line when it comes to securing workforce access to applications. On the one hand, mitigating the risks of data breaches is a top priority – no company wants to end up on the front page of The Wall Street Journal as a high profile data breach. On the other hand, security must be balanced with the user experience. Time-consuming authentication techniques erode overall productivity. Worse, the more onerous the security measures, the more motivated the workforce will be to find ways around them. Traditionally, companies lock down remote logins by deploying VPNs, requiring employees and partners to use corporate-issued equipment, or issuing hardware tokens or one-time passwords (OTP) for strong authentication. These methods are getting more and more impracticable in today’s “consumerized” IT environment. Context-BasedAuthenticationandFederatedTrust ThreatMetrix offers an alternative to traditional workforce authentication models, leveraging a shared trust intelligence network that currently protects more than 2,500 financial services and e-commerce companies from global cybercriminal rings. ThreatMetrix offers real-time technologies that analyze online personas, employee devices, transactional or application context and employee behavior. As a passive, network-based solution delivered from the cloud, ThreatMetrix is capable of recognizing all employee- supplied devices, whether they have authenticated in the past or not. A global policy engine lets Cover Story ThreatMetrix: PioneeringContext-Based WorkforceAuthenticationReed Taussig, President & CEO, ThreatMetrix By Christo Jacob
  • 3. | |March 2014 5CIOReview| |March 2014 4CIOReview defense against these global forces is a global network. From its inception in 2005, ThreatMetrix has been developing a global network in the fight against cybercrime. Supporting over 2,500 of the world’s largest Internet retailers, financial institutions and social networking sites, ThreatMetrix has built a federated trust network that examines tens of millions of employee and customer logins and account registrations every day. Using the power of shared intelligence across more than 10,000 customer websites ThreatMetrix provides the largest federated trust network in the world. All of the devices, personas and transactions that take place across the customers’ websites in the ThreatMetrix network are shared as part of the ThreatMetrix™GlobalTrustIntelligence Network (The Network). Data on The Network includes device identification characteristics, user and persona profiles, behavior, detected relationships and threat assessments. This massive data set is refreshed and analyzed continuously to identify emerging threats. All ThreatMetrix customers contribute value by sharing anonymous data with the Network. In turn, all participants of the Network benefit from the global insight developed by the network. To protect user privacy, all of a business’ data is encrypted and anonymized before being sent to the globalnetwork.WithintheThreatMetrix platform, multi-level encryption ensures that data remains private between all the participants in the network, including ThreatMetrix. “It is the power of The Network that provides our customers with this reliable and cost-effective solution,” said Reed Taussig, President and CEO of ThreatMetrix. “Rather than deriving decision data from a single enterprise, ThreatMetrix customers share anonymous data globally. This increases the perspective, quality and value of the data while driving down the cost to the enterprise.” ExtendingthePoweroftheNetwork Withhundredsofmillionsoftransactions available each month, ThreatMetrix is using “big data” techniques to mine this information for insight that benefits all of its customers, as well as the Internet as a whole. One can see the real-time analysis of fraud attempts detected throughout the global network on the ThreatMetrix Web Fraud Map. For businesses looking to reduce the threat of data breaches from unauthorized application access, combining context-based authentication with a global federated identity network is the most flexible and cost-effective way to increase security while reducing the cost and friction for workforce access. businesses define specific and appropriate risk and access policies. Using ThreatMetrix, businesses can tag trusted combinations of credentials and identify indicators of risk learned from a global network of online identities, transactions and data. By analyzing the contextual information from the login and comparing it to data from a global network, ThreatMetrix can help business reduce the risks of remote login without burdening the user. “Enterprise adaptive access control combines contextual information and user credentials to evaluate the risk of users attempting to access resources. Once the purview of e- commerce and financial services, adaptive access is finding an increased role in workforce identity — particularly for mobile device use cases.” [Source: “AdaptiveAccess Control Brings Together Identity, Risk and Context,” Gartner: Trent Henry, August 2013] Context-based authentication has two essential benefits for the enterprise: • Frictionless access: Real-time, passive assessment of the login context gives businesses the ability to streamline access for known and trusted combinations of logins and devices – reducing effort and inconvenience for the workforce. • Increased security: Combining global federated trusted identities with context- based authentication helps businesses quickly and easily identify high-risk connections that have the potential to compromise data. This includes devices that are part of botnets, devices associated with many different unregistered credentials that are used to conceal true identity or devices that are known to be involved with fraudulent access across the ThreatMetrix global network. TheFrictionlessLogin A typical implementation works like this: 1. The first time an employee logs into a sensitive application such as a financial system, ThreatMetrix creates a profile of the incoming user. The individual is prompted to perform step-up authentication, perhaps using an OTP sent to their registered mobile phone. At this point, ThreatMetrix tags that trusted combination of device and account for future reference. 2. The next time that employee logs in, the ThreatMetrix platform does a real- time analysis for any threats (malware, etc.) and identifies the trusted online identity. This is transparent to the employee. 3. If the employee gets a new laptop or tablet and that device has been authenticated with appropriate and acceptable credentials anywhere across the ThreatMetrix network, the enterprise can choose how to address the situation: accept those credentials without challenge or execute a challenge to further authenticate that user’s credentials. Every transaction is screened for other indicators of risk, including malware, botnets and behavioral risk factors. 4. Combining real-time contextual authentication with federated trusted identity data derived from the ThreatMetrix network provides seamless, reliable identification of user credentials without the need to install and maintain MDM, token or other device-specific solutions. Using this process, businesses can detect anomalies and keep hackers out while streamlining legitimate workforce connection. It can also detect anomalous behavior that might indicate an insider threat, such as unauthorized password sharing that puts regulatory compliance at risk. BenefitingfromtheNetworkEffect The power of the ThreatMetrix solution comes not only from its technologies, but also from the data it collects and analyzes across its global network. The forces arrayed against the enterprise are growing in size and sophistication. A few years ago most data breach attempts came from clumsy phishing emails and opportunistic, individual hackers. Today’s online threat environment is characterized by well-organized and well-financed cyber-terrorist rings and crowd-sourced malware and botnets. The only viable When it comes to context-based authentication, the larger the network, the greater the chance that you can identify and exclude potential threats – including the organized cybercrime or crowd- sourced malware targeting busi- nesses. The Global Trust Intelligence Network (The Network) includes many of the world’s largest Inter- net retailers, financial institutions and social networking sites. The Network is massive and growing rapidly. As of the begin- ning of 2014, more than 2,500 businesses worldwide share in- formation about transactions generated on more than 10,000 websites, tracking over 160 million active user accounts. Networks: Size Does Matter Context-based authenticationis gainingtraction becauseitaddresses twoconvergingtrends– theescalatingneedfor establishingtrustonthe Internet,coupledwith concernsaboutprivacy inanageofmassivedata collection - ReedTaussig, President & CEO,ThreatMetrix Traditional strong authentication measures often require you to give up more personal information to tie your online identity with a real-world identity. But revealing personal information to more entities puts online privacy at greater risk, as attackers and criminals target the repositories of that data. The Global Trust Intelligence Network (The Network) is carefully designed to protect the security and privacy of all data in the network. While your business has the information about exactly who is linked to each login, that data is anonymized before it becomes part of the network. ThreatMetrix tracks the behavior of a person online, without needing to know exactly who the person is. It is both passive and anonymous from the user perspective. This anonymous data can be shared throughout the global network without revealing information about the persona’s real-world identity. “Context-based authentication is gaining traction because it addresses two converging trends – the escalating need for establishing trust on the Internet, coupled with concerns about privacy in an age of massive data collection,” says Taussig. “With context-based authentication, you don’t have to sacrifice privacy in the name of online security.” Protecting Personal Privacy ThreatMetrix Global Trust Intelligence Network Using the power of shared intelligence across more than 2,500 customers and 10,000 websites, the ThreatMetrix™ Global Trust Intelligence Network provides the largest federated trust network in the world.