Layered authentication strategies ask for the right level of assurance at the right time, in an environment where risk and context might be changing constantly. This presentation on end -to-end authentication using a layered approach was delivered at iovation's annual Fraud Force Summit 2016.
7. 7
FOUR STEPS TO IMPROVING IT ALL
W I T H B E T T E R S E C U R I T Y A N D B E T T E R E X P E R I E N C E
Understand the risks better
8. 8
FOUR STEPS TO IMPROVING IT ALL
W I T H B E T T E R S E C U R I T Y A N D B E T T E R E X P E R I E N C E
Understand the risks better
Understand the context better
9. 9
FOUR STEPS TO IMPROVING IT ALL
W I T H B E T T E R S E C U R I T Y A N D B E T T E R E X P E R I E N C E
Understand the risks better
Understand the context better
Adapt as risk and context change
10. 10
FOUR STEPS TO IMPROVING IT ALL
W I T H B E T T E R S E C U R I T Y A N D B E T T E R E X P E R I E N C E
Understand the risks better
Understand the context better
Adapt as risk and context change
Use tools that help you respond to those changes
11. 11
FOUR STEPS TO IMPROVING IT ALL
W I T H B E T T E R S E C U R I T Y A N D B E T T E R E X P E R I E N C E
Understand the risks better
Understand the context better
Be able to adapt as risk and context change
Use tools that help you respond to those changes
12. 12
IOVATION SOLUTIONS
O U R V I E W O F T H E W O R L D C H A N G E D O N S E P T 7 2 0 1 6
IOVATION INTELLIGENCE CENTER
ProductsPlatform
Fraud
Prevention Suite
Stop online fraud and abuse in real-time
Fraud
Prevention
Solution
iovationScore
Dynamic
Authentication Suite
Multifactor security with exceptional user experience
Customer
Authentication
LaunchKey MFA
Solution
GLOBAL DEVICE INTELLIGENCE PLATFORM
Device
Recognition
Device
Associations
Contributed
Evidence
Deep
Analytics
Machine
Learning
13. 13
IOVATION SOLUTIONS
O U R V I E W O F T H E W O R L D C H A N G E D O N S E P T 7 2 0 1 6
Fraud
Prevention Suite
Stop online fraud and abuse in real-time
IOVATION INTELLIGENCE CENTER
GLOBAL DEVICE INTELLIGENCE PLATFORM
Device
Recognition
Device
Associations
Contributed
Evidence
Deep
Analytics
Machine
Learning
ProductsPlatform
Fraud
Prevention
Solution
iovationScore
Dynamic
Authentication Suite
Multifactor security with exceptional user experience
Customer
Authentication
LaunchKey MFA
Solution
Dynamic
Authentication Suite
Multifactor security with exceptional user experience
Customer
Authentication
LaunchKey MFA
Solution
E N D - T O - E N D L AY E R E D A U T H E N T I C AT I O N
14. 14
Customer
Authentica
tion service
Best-in-class, risk-based
and contextually-aware
device recognition
provides authentication
using precise device
fingerprinting and
machine learning.
Identifies risks and
anomalies associated
with the session or user.
Uses “device” as a proxy
for the customer and
associated reputations.
Passive authentication
provides high assurance
without interruption.
Transparent
Device-based
Risk-aware
15. 15
LAUNCH
KEY MFA
Solution
A state-of-the art multi-
factor solution that
includes five user-
selectable factors and
a fully customizable
mobile application for
authentication and
authorization.
Single- or multi-party
“swipe” authorization
provides auditable
security and assurance.
Administrators (and
customers) can choose
from numerous methods.
Real-time multifactor
authentication via off-the-
shelf or custom
authenticator apps.
Interactive
Flexible
Authorization
29. 29
LOGIN
CHANGE
ACCOUNT DETAILS
CHECK ACCOUNT
BALANCES
FUND TRANSFER
LOAN OR
ACCOUNT CREATION
DEPOSITMAKE PAYMENTS
CUSTOMER AUTHENTICATION
SERVICE
LAUNCHKEY MFA
SOLUTIONE N D - T O - E N D L AY E R E D A U T H E N T I C AT I O N
IOVATION
FRAUD PREVENTION
30. 30
M I L E S T O N E S O N T H E R O A D T O A PA S W O R D L E S S F U T U R E
1
Use device
recognition to
augment passwords
and reduce friction
Device-based, context-
aware authentication
with MFA becomes
the new norm
3
Limit the use of
passwords to high-risk
transactions and
requests only
2
IMPROVEMEN
T
AVOIDANCE REPLACEMEN
T
31. 31
TAKEAWAYS
F O R F R A U D T E A M S , S E C U R I T Y T E A M S , A N D U S E R E X P E R I E N C E T E A M S
USER
EXPERIENCE
The pendulum has
swung into your court.
In “Internet 3.0” you
live at the intersection
of fraud, security and
the customer.
Set the standards
for your organization
(see Adobe Best of
the Best).
SECURITY
Think “beyond the
enterprise” – out
where your
customers live and
move.
Leverage the tools
and experience of the
fraud team.
User experience
really matters (see
Amazon.com).
FRAUD
“Fraud happens when
authentication fails.”
Better authentication
means fewer shots
for fraudsters.
Your experience is
the backbone of an
end-to-end layered
auth strategy.