Manage Digital Risk
Address Critical Business Needs
Context-Based, Next-Generation Authentication: Key Traits and Endurance
context-based, next-generation authentication
Read more
Your Step-Up Authentication Compass... NIST & SMS - Finding North
An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST SP800-63B) has been let loose into the salt waters of the public and certainly provoked some conversation of late around...
Top 5 Authentication Trends in 2017
What does your authentication future look like?
Next-Generation Authentication: Addressing Changing Compute Paradigms
To achieve optimal security in today’s rapidly evolving computing environment, companies are turning to sophisticated authentication mechanisms. Next-generation authentication is identity and access validation that adapts to protect assets against both static and continuously changing variables. This type of authentication needs to accommodate the following: The...
Authentication: One Size Does Not Fit All
I’ve been coming to the RSA conference on and off (mostly on) for more than 15 years, and each year there seems to be more strong authentication vendors demonstrating new and interesting approaches to authenticating end users. At RSA, we track and test these different approaches to find the best ones for integration into our...
Making Smart Choices for Identity Assurance
Good news: in 2015, device makers, OS providers and authentication solution providers all picked up their momentum on initiatives tackling user authentication challenges. Cases in point: the support of fingerprint sensors in Google Android M, the proliferation of Apple Touch ID supporting solutions, Microsoft Windows 10 multi-method biometric support, Samsung’s...
4 Tips for End-to-end Passwordless Authentication for Hybrid Deployments
Four tips to go from a password-laden infrastructure to a passwordless one.
Six Keys to Successful Identity Assurance - Flexible Authentication
So far, we’ve discussed the first five keys to a successful identity assurance: business context, anomaly detection, machine learning, broader ecosystem, and consistent experience. Let’s close the series with an important topic for both end users and administrators: flexible authentication. Administration Flexibility When we think of providing flexibility for...
3 Ways Proximity Authentication Is Revolutionizing Access
Modernize secure access by saying Hello to proximity authentication
Making Access More Secure and More Convenient with Facial Recognition
Facial recognition, the next evolution of authentication security and convenience.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.