Risk-based Authentication: The Future of Guarding your Network, Systems and Data

  • Tuesday, February 25, 2014 | 2:40 PM – 3:40 PM | West | Room: 2023

View all Sessions

Traditional authentication and authorization tools have limited success in preventing sophisticated attackers from gaining unauthorized access to networks, systems and data. New tools, using risk-based analytics, consider context in addition to credentials. Risk scoring, using a variety of data elements, can help improve the confidence associated with authentication or authorization requests.


This document was retrieved from on Mon, 30 Nov 2015 22:53:40 -0500.
© 2015 EMC Corporation. All rights reserved.