Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authentication

July 22, 2015 from 01:30 PM – 02:30 PM UTC
|

Mobility is increasing enterprise risk by adding further complexity and fragmentation to existing access management environments. Join us to learn how you can provide employees mobile access to enterprise applications and corporate data without compromising security.

Securing mobile starts by authenticating users and ensuring their mobile devices has not been compromised. When you authenticate a user, it’s not enough to simply confirm the user’s password is correct. You must look at other factors at the time of authentication including: time of day, device type and IP address to name just a few. This is known as risk-based authentication and it’s an important part of mobile security.

In this presentation, we provide an overview of IBM’s Mobile Security Framework and how you can use risk-based authentication to protect your enterprise.

Watch the on-demand webinar

 

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today