SlideShare a Scribd company logo
Stop Cyber Attackers in Their Tracks with
Adaptive Authentication
December 1, 2015
2Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Today’s Speakers
Tim Arvanites
Vice President, Technical Services
SecureAuth
Darin Pendergraft
Vice President, Marketing
SecureAuth
3Stop Cyber Attackers in Their Tracks with Adaptive Authentication
WebEx Housekeeping
+ All attendee audio lines are muted
+ Submit questions via Q&A panel at any time
+ Questions will be answered during Q&A at the end of the
presentation
+ Slides and recording will be sent later this week
+ Contact us at webinars@secureauth.com
4Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Agenda
+ Today’s Reality
+ The Alternative
+ Adaptive Authentication in SecureAuth™ IdP Demo
+ Q & A
5Stop Cyber Attackers in Their Tracks with Adaptive Authentication
6Stop Cyber Attackers in Their Tracks with Adaptive Authentication
The reality is….
+ Preventative measures are failing
+ We’re never going to totally stop an attack
– There are humans involved (on both sides)
– The battlefield is asymmetric
+ Passwords are no longer good enough
+ There is hope!
7Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Lets Examine an Attack
8Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Tighter security has a price
+ Consumerization of IT
– Our users demand less “friction”
– BYOD means all kinds of devices must get access
– Mix of business and personal apps
+ Is Two-Factor the Best We’ve Got?
– Better than passwords alone
– Requires the user to do something
– Hardware tokens can be lost or stolen
So what’s the alternative?
10Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Adaptive Authentication
+ Using an open-ended variety of identity-relevant data to
incrementally elevate the trust in a claimed identity*
+ When layered together, they’re powerful
*Gartner - A Taxonomy of User Authentication Methods, April 2014
– Device Recognition
– IP Reputation Data
– Identity Store Lookup
– Geo-Location
– Geo-Velocity
– Behavioral Biometrics
11Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Device Recognition
+ First time authentication: register the endpoint device
+ Subsequent authentications: validate the endpoint device
+ Device recognition can include:
– web browser configuration – device IP address
– language – screen resolution
– installed fonts – browser cookies settings
– browser plugin – time zone
12Stop Cyber Attackers in Their Tracks with Adaptive Authentication
IP Reputation Data
13Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Identity Store Lookup
+ Compare and filter based on information in the store
+ Can be based on any attribute of the user
14Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Geo-Location
+ Compare the users current geographic location against good
or bad locations
15Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Geo-Velocity
+ Compare current location and login history to determine whether
an improbable travel event has occurred
16Stop Cyber Attackers in Their Tracks with Adaptive Authentication
+ Analyze behavior that can be used to verify a person
+ Gather & store characteristics about the way the user
interacts with a device such as:
– Keystroke dynamics
– Mouse movements
– Gesture patterns
– Motion patterns
Behavioral Biometrics
17Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Putting it all together
SecureAuth™ IdP Live Demo
19Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Why SecureAuth™ IdP?
Two-factor, adaptive authentication and SSO in one solution
20Stop Cyber Attackers in Their Tracks with Adaptive Authentication
There is hope
+ Adaptive authentication: an emerging trend in authentication
technology
+ Adaptive authentication techniques are most powerful when
layered together
+ You can achieve:
– Greater analysis and control of authentication
– Balance between security and a better user experience
+ Preventative methods are failing, but you can tighten the net
around attackers
Q&A
Find out more about Adaptive Authentication at
www.secureauth.com/Product/Adaptive-Authentication.aspx
The intellectual content within this document is the property of SecureAuth
and must not be shared without prior consent.

More Related Content

PDF
How to Automate User Provisioning
PPTX
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
PDF
Identity Live Sydney: Intelligent Authentication
PDF
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
PPTX
Information technology Vs Information security
PPT
Identity-Defined Privacay & Security for Internet of Things
PPTX
Identity Access Management 101
PDF
Clear and Present Danger
How to Automate User Provisioning
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Identity Live Sydney: Intelligent Authentication
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Information technology Vs Information security
Identity-Defined Privacay & Security for Internet of Things
Identity Access Management 101
Clear and Present Danger

What's hot (20)

PPTX
Kent King - PKI: Do You Know Your Exposure?
PPTX
Managing Identity without Boundaries
PPTX
Two factor authentication 2018
PPTX
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
PPTX
Cryptography Tutorial
PDF
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
PDF
Dorking & Pentesting with Tacyt
PDF
Security for Human Beings
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PDF
How to Take Cloud Access Control to the Next Level
PPTX
Multifactor Authentication
PPTX
Seminar-Two Factor Authentication
PPTX
CyberCamp 2015: Low Hanging Fruit
PDF
Introduction and a Look at Security Trends
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PDF
1. penetration-testing-cyber51
PDF
Mobile App Security Predictions 2019
PPTX
Two Factor Authentication
PPTX
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PPTX
Multi-Factor Authentication - "Moving Towards the Enterprise"
Kent King - PKI: Do You Know Your Exposure?
Managing Identity without Boundaries
Two factor authentication 2018
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Cryptography Tutorial
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Dorking & Pentesting with Tacyt
Security for Human Beings
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
How to Take Cloud Access Control to the Next Level
Multifactor Authentication
Seminar-Two Factor Authentication
CyberCamp 2015: Low Hanging Fruit
Introduction and a Look at Security Trends
Webinar: Goodbye RSA. Hello Modern Authentication.
1. penetration-testing-cyber51
Mobile App Security Predictions 2019
Two Factor Authentication
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Multi-Factor Authentication - "Moving Towards the Enterprise"
Ad

Similar to How to Stop Cyber Attacks Using Adaptive Authentication (20)

PDF
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PPTX
A CISO's Guide to Cyber Liability Insurance
PPTX
AY - Adaptive Access Control
PPTX
PCI DSS Simplified: What You Need to Know
PPTX
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
PDF
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
PDF
New challenges to secure the IoT (with notes)
PPTX
What's New in IdP 9.0 Behavioral Biometrics and more…
PDF
datasheet-quickheal-total-securitypdf...
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PDF
Axxera Security Solutions Ver 2.0
PDF
Security Breakout Session
PPTX
Allianz Global CISO october-2015-draft
PPTX
Fortify technology
PDF
Understanding Identity Management and Security.
PDF
Improving Mobile Authentication for Public Safety and First Responders
PDF
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
PPTX
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
PDF
Intelligent Authentication
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
A CISO's Guide to Cyber Liability Insurance
AY - Adaptive Access Control
PCI DSS Simplified: What You Need to Know
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
New challenges to secure the IoT (with notes)
What's New in IdP 9.0 Behavioral Biometrics and more…
datasheet-quickheal-total-securitypdf...
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Axxera Security Solutions Ver 2.0
Security Breakout Session
Allianz Global CISO october-2015-draft
Fortify technology
Understanding Identity Management and Security.
Improving Mobile Authentication for Public Safety and First Responders
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
Intelligent Authentication
Ad

More from SecureAuth (19)

PPTX
The Death of 2FA and the Birth of Modern Authentication
PPT
Portal Protection Using Adaptive Authentication
PPTX
SecureAuth Solution Enhancements in 2017
PDF
Passwordless is Possible - How to Remove Passwords and Improve Security
PDF
Top 5 Reasons to Choose Adaptive SSO
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
What's New in SecureAuth IdP in 2017
PPTX
2017 Predictions: Identity and Security
PPTX
Why Two-Factor Isn't Enough
PDF
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
PPTX
The Rise of California Cybercrime
PPTX
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
PPTX
What’s New In SecureAuth™ IdP, 8.2
PPTX
What to Expect in 2016: Top 5 Predictions for Security and Access Control
PPTX
Balancing User Experience with Secure Access Control in Healthcare
PDF
Advanced Authentication: Past, Present, and Future
PPTX
The Future of Mobile Application Security
PPTX
Modern Architectures
PPTX
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
The Death of 2FA and the Birth of Modern Authentication
Portal Protection Using Adaptive Authentication
SecureAuth Solution Enhancements in 2017
Passwordless is Possible - How to Remove Passwords and Improve Security
Top 5 Reasons to Choose Adaptive SSO
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
What's New in SecureAuth IdP in 2017
2017 Predictions: Identity and Security
Why Two-Factor Isn't Enough
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
The Rise of California Cybercrime
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
What’s New In SecureAuth™ IdP, 8.2
What to Expect in 2016: Top 5 Predictions for Security and Access Control
Balancing User Experience with Secure Access Control in Healthcare
Advanced Authentication: Past, Present, and Future
The Future of Mobile Application Security
Modern Architectures
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers

Recently uploaded (20)

PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
AI in Product Development-omnex systems
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Introduction to Artificial Intelligence
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
System and Network Administraation Chapter 3
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
L1 - Introduction to python Backend.pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
medical staffing services at VALiNTRY
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
ai tools demonstartion for schools and inter college
PDF
top salesforce developer skills in 2025.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
Operating system designcfffgfgggggggvggggggggg
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
ManageIQ - Sprint 268 Review - Slide Deck
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Wondershare Filmora 15 Crack With Activation Key [2025
AI in Product Development-omnex systems
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Introduction to Artificial Intelligence
Odoo POS Development Services by CandidRoot Solutions
System and Network Administraation Chapter 3
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
VVF-Customer-Presentation2025-Ver1.9.pptx
L1 - Introduction to python Backend.pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
medical staffing services at VALiNTRY
How to Choose the Right IT Partner for Your Business in Malaysia
ai tools demonstartion for schools and inter college
top salesforce developer skills in 2025.pdf
Design an Analysis of Algorithms I-SECS-1021-03

How to Stop Cyber Attacks Using Adaptive Authentication

  • 1. Stop Cyber Attackers in Their Tracks with Adaptive Authentication December 1, 2015
  • 2. 2Stop Cyber Attackers in Their Tracks with Adaptive Authentication Today’s Speakers Tim Arvanites Vice President, Technical Services SecureAuth Darin Pendergraft Vice President, Marketing SecureAuth
  • 3. 3Stop Cyber Attackers in Their Tracks with Adaptive Authentication WebEx Housekeeping + All attendee audio lines are muted + Submit questions via Q&A panel at any time + Questions will be answered during Q&A at the end of the presentation + Slides and recording will be sent later this week + Contact us at webinars@secureauth.com
  • 4. 4Stop Cyber Attackers in Their Tracks with Adaptive Authentication Agenda + Today’s Reality + The Alternative + Adaptive Authentication in SecureAuth™ IdP Demo + Q & A
  • 5. 5Stop Cyber Attackers in Their Tracks with Adaptive Authentication
  • 6. 6Stop Cyber Attackers in Their Tracks with Adaptive Authentication The reality is…. + Preventative measures are failing + We’re never going to totally stop an attack – There are humans involved (on both sides) – The battlefield is asymmetric + Passwords are no longer good enough + There is hope!
  • 7. 7Stop Cyber Attackers in Their Tracks with Adaptive Authentication Lets Examine an Attack
  • 8. 8Stop Cyber Attackers in Their Tracks with Adaptive Authentication Tighter security has a price + Consumerization of IT – Our users demand less “friction” – BYOD means all kinds of devices must get access – Mix of business and personal apps + Is Two-Factor the Best We’ve Got? – Better than passwords alone – Requires the user to do something – Hardware tokens can be lost or stolen
  • 9. So what’s the alternative?
  • 10. 10Stop Cyber Attackers in Their Tracks with Adaptive Authentication Adaptive Authentication + Using an open-ended variety of identity-relevant data to incrementally elevate the trust in a claimed identity* + When layered together, they’re powerful *Gartner - A Taxonomy of User Authentication Methods, April 2014 – Device Recognition – IP Reputation Data – Identity Store Lookup – Geo-Location – Geo-Velocity – Behavioral Biometrics
  • 11. 11Stop Cyber Attackers in Their Tracks with Adaptive Authentication Device Recognition + First time authentication: register the endpoint device + Subsequent authentications: validate the endpoint device + Device recognition can include: – web browser configuration – device IP address – language – screen resolution – installed fonts – browser cookies settings – browser plugin – time zone
  • 12. 12Stop Cyber Attackers in Their Tracks with Adaptive Authentication IP Reputation Data
  • 13. 13Stop Cyber Attackers in Their Tracks with Adaptive Authentication Identity Store Lookup + Compare and filter based on information in the store + Can be based on any attribute of the user
  • 14. 14Stop Cyber Attackers in Their Tracks with Adaptive Authentication Geo-Location + Compare the users current geographic location against good or bad locations
  • 15. 15Stop Cyber Attackers in Their Tracks with Adaptive Authentication Geo-Velocity + Compare current location and login history to determine whether an improbable travel event has occurred
  • 16. 16Stop Cyber Attackers in Their Tracks with Adaptive Authentication + Analyze behavior that can be used to verify a person + Gather & store characteristics about the way the user interacts with a device such as: – Keystroke dynamics – Mouse movements – Gesture patterns – Motion patterns Behavioral Biometrics
  • 17. 17Stop Cyber Attackers in Their Tracks with Adaptive Authentication Putting it all together
  • 19. 19Stop Cyber Attackers in Their Tracks with Adaptive Authentication Why SecureAuth™ IdP? Two-factor, adaptive authentication and SSO in one solution
  • 20. 20Stop Cyber Attackers in Their Tracks with Adaptive Authentication There is hope + Adaptive authentication: an emerging trend in authentication technology + Adaptive authentication techniques are most powerful when layered together + You can achieve: – Greater analysis and control of authentication – Balance between security and a better user experience + Preventative methods are failing, but you can tighten the net around attackers
  • 21. Q&A
  • 22. Find out more about Adaptive Authentication at www.secureauth.com/Product/Adaptive-Authentication.aspx
  • 23. The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.