Founder and CEO
Authentication has become a critical part of security strategy. Over 81% of data breaches were perpetrated using compromised credentials. Traditional means of authenticating users - passwords and OTPs - are no longer sufficient. Users expect authentication to be frictionless and secure. That sounds great, but how do you make it happen? We’ll discuss the leading forms of authentication including biometrics, PKI and behavioral analytics and explore ways to orchestrate these authenticators with risk-based adaptive authentication.
•Discuss the different types of authentication technologies available
•Explore the orchestration of authenticators with risk-based adaptive authentication
•Highlight best-practices that balance security with user experience