Risk-based Authentication: The Future of Guarding your Network, Systems and Data

  • Tuesday, February 25, 2014 | 2:40 PM – 3:40 PM | West | Room: 2023

View all Sessions

Traditional authentication and authorization tools have limited success in preventing sophisticated attackers from gaining unauthorized access to networks, systems and data. New tools, using risk-based analytics, consider context in addition to credentials. Risk scoring, using a variety of data elements, can help improve the confidence associated with authentication or authorization requests.


This document was retrieved from on Sat, 10 Oct 2015 14:06:44 -0400.
© 2015 EMC Corporation. All rights reserved.