SlideShare a Scribd company logo
1 of 43
When Customers Win:
OmniChannel Authentication
MICHAEL THELANDER, DIRECTOR OF PRODUCT MARKETING
Authentication
“The corroboration of a claimed identity
to an agreed-upon level of assurance.”
W H E N C U S T O M E R S W I N : O M N I C H A N N E L A U T H E N T I C AT I O N
WHAT IS OMNICHANNEL AUTHENTICATION?
THE IMPORTANCE OF RISK AND
CONTEXT
WHAT IS REQUIRED?
BENEFITS TO YOU AND YOUR CUSTOMERS
WHAT IS OMNICHANNEL AUTHENTICATION?
WHAT IS OMNICHANNEL AUTHENTICATION?
T H E S A M E E X P E R I E N C E A C R O S S A L L C O N S U M E R T O U C H P O I N T S
WHAT IS OMNICHANNEL AUTHENTICATION?
T H E S A M E E X P E R I E N C E A C R O S S A L L C O N S U M E R T O U C H P O I N T S
THE IMPORTANCE OF RISK AND CONTEXT
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better1
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better1
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
1
2
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
1
2
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
Adapt as risk and context change
1
2
3
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
Adapt as risk and context change
1
2
3
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
Adapt as risk and context change
Have tools that help you respond to those changes
1
2
3
4
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
Adapt as risk and context change
Have tools that help you respond to those changes
1
2
3
4
THE IMPORTANCE OF RISK AND CONTEXT
F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E
Understand the risks better
Understand the context better
Be able to adapt as risk and context change
Use tools that help you respond to those changes
1
2
3
4
WHAT IS REQUIRED?
WHAT DOES OMNICHANNEL REQUIRE?
M U LT I P L E S O L U T I O N S C E N T E R E D O N T H E C U S T O M E R ’ S D E V I C E
Transparent, device-based
authentication that provides context
Risk-aware multifactor authentication
that provides variable assurance
1
2
3
WHAT DO WE MEAN BY “DEVICE -BASED”?
M A C H I N E L E A R N I N G T H AT A U T H E N T I C AT E S A K N O W N D E V I C E
Transparent device-based authentication
eliminates friction for most users
Turns your customer’s mobile device into a
reliable possession factor
Machine learning continuously assesses
devices
Highlights the risk and context of any device
Adaptive, contextual response drives step-up
authentication and subsequent actions
MINIMUM
THRESHOLD
MAXIMUM
THRESHOLD
Original Device
Print
Returning
Device Print
WHAT DO WE MEAN BY “MULTIFACTOR”?
M O B I L E - B A S E D A U T H E N T I C AT I O N T H AT D E L I V E R S A VA R I E T Y O F F A C T O R S
Something you
KNOW
Something you
HAVE
Something you
ARE
Like what you’re hearing? Go to www.iovation/resources/videos to learn more…
…Or click NEXT to continue with this slide share.
AUTHENTICATION AND USER EXPERIENCE
Lower Risk
Higher Risk
Transparent
DEVICE-BASED AUTHENTICATION SERVICE
Interactive
MOBILE MULTIFACTOR AUTHENTICATION
Real-time
EXPLICIT AUTHORIZATION
80%
15%
5%
Transparent
DEVICE-BASED AUTHENTICATION SERVICE
EVASION
IP ADDRESS
JAILBROKENGEOLOCATION
SECURITY RISK
ASSOCIATIONS
INITIAL REGISTRATION AUTHENTICATED
Transparent
DEVICE-BASED AUTHENTICATION SERVICE
Interactive
MOBILE MULTIFACTOR AUTHENTICATION
Transparent
DEVICE-BASED AUTHENTICATION SERVICE
Interactive
MOBILE MULTIFACTOR AUTHENTICATION
Real-time
EXPLICIT AUTHORIZATION
I agree
YOU ARE
who you say you
are….
But are you
AUTHORIZED
to do what you’re
asking to do?
Real-time
Authorization
For Multiple
Authorizers
OR
A U T H O R I Z E I N D I V I D UA L O R G R O U P T R A N S A C T I O N S
Transparent
DEVICE-BASED AUTHENTICATION SERVICE
Interactive
MOBILE MULTIFACTOR AUTHENTICATION
Real-time
EXPLICIT AUTHORIZATION
The Right Authentication for Every Channel and Every Level of Risk
BENEFITS TO YOU AND YOUR CUSTOMERS
 1,095 US Consumers
 Mixed demographics
 Priorities between ease-
of-use and security
 Authentication impacts
 Willingness to pay for
stronger authentication
 What is their confidence?
AITE REPORT
N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
 Ease of use is only
marginally more important
than security and fraud
prevention
 Equally true for all
demographics
 With regard to interactive
authentication and
authorization, Millennials
and Seniors are alike in
many respects
AITE REPORT
N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
 There’s a high
willingness to use
alternate authentication
methods …
 And very few who are
not at all willing
AITE REPORT
N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
 Willingness to change
increases as expected
with an incentive in place
AITE REPORT
N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
 Usability is a competitive differentiator
 Improved authentication enables your
mobile application strategy
 Your customers create more sessions ad
transaction if authentication is not a barrier
 Customer satisfaction is disproportionately
based on digital experience
WHEN CONSUMERS WIN …
B U S I N E S S T E A M S A N D S E C U R I T Y T E A M S A L S O W I N
 Start on a “path to passwordless”
 Reduce costs by simplifying and unifying
authentication and authorization experiences
 Gradually reduce – and then eliminate –
your on-premise credential stores
 Leverage the risk and contextual insight the
fraud prevention teams already generate
Benefits for Business Leaders Benefits for Risk & Security Teams
Visit
www.iovation.com/resources

More Related Content

Similar to When Customers Win: 
OmniChannel Authentication 

Value proposition design
Value proposition designValue proposition design
Value proposition design
Adrian Holzer
 

Similar to When Customers Win: 
OmniChannel Authentication  (20)

Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer Authentication
 
Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0
 
Welcome to ZOCCAM
Welcome to ZOCCAMWelcome to ZOCCAM
Welcome to ZOCCAM
 
Performing While Transforming: Disrupting as an Incumbent
Performing While Transforming: Disrupting as an IncumbentPerforming While Transforming: Disrupting as an Incumbent
Performing While Transforming: Disrupting as an Incumbent
 
Marketing Week Live_Cheetah Digital_It's the e-conomy, stupid.
Marketing Week Live_Cheetah Digital_It's the e-conomy, stupid. Marketing Week Live_Cheetah Digital_It's the e-conomy, stupid.
Marketing Week Live_Cheetah Digital_It's the e-conomy, stupid.
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
 
Omni channels process and technology
Omni channels process and technologyOmni channels process and technology
Omni channels process and technology
 
KODAK Presentation .pptx
KODAK Presentation .pptxKODAK Presentation .pptx
KODAK Presentation .pptx
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
 
Analytics and Big Data in Law Firms
Analytics and Big Data in Law FirmsAnalytics and Big Data in Law Firms
Analytics and Big Data in Law Firms
 
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warrenSecuring Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
 
LAS CLAVES DE LA COMUNICACION (ESPAÑOL)
LAS CLAVES DE LA COMUNICACION (ESPAÑOL)LAS CLAVES DE LA COMUNICACION (ESPAÑOL)
LAS CLAVES DE LA COMUNICACION (ESPAÑOL)
 
Reason Street Pitching for Value
Reason Street Pitching for ValueReason Street Pitching for Value
Reason Street Pitching for Value
 
Customer Experience (CX) Design
Customer Experience (CX) Design Customer Experience (CX) Design
Customer Experience (CX) Design
 
Virtual internships
Virtual internshipsVirtual internships
Virtual internships
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Value proposition design
Value proposition designValue proposition design
Value proposition design
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 

When Customers Win: 
OmniChannel Authentication 

  • 1. When Customers Win: OmniChannel Authentication MICHAEL THELANDER, DIRECTOR OF PRODUCT MARKETING
  • 2. Authentication “The corroboration of a claimed identity to an agreed-upon level of assurance.”
  • 3.
  • 4.
  • 5.
  • 6. W H E N C U S T O M E R S W I N : O M N I C H A N N E L A U T H E N T I C AT I O N WHAT IS OMNICHANNEL AUTHENTICATION? THE IMPORTANCE OF RISK AND CONTEXT WHAT IS REQUIRED? BENEFITS TO YOU AND YOUR CUSTOMERS
  • 7. WHAT IS OMNICHANNEL AUTHENTICATION?
  • 8. WHAT IS OMNICHANNEL AUTHENTICATION? T H E S A M E E X P E R I E N C E A C R O S S A L L C O N S U M E R T O U C H P O I N T S
  • 9. WHAT IS OMNICHANNEL AUTHENTICATION? T H E S A M E E X P E R I E N C E A C R O S S A L L C O N S U M E R T O U C H P O I N T S
  • 10. THE IMPORTANCE OF RISK AND CONTEXT
  • 11. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better1
  • 12. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better1
  • 13. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better 1 2
  • 14. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better 1 2
  • 15. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better Adapt as risk and context change 1 2 3
  • 16. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better Adapt as risk and context change 1 2 3
  • 17. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better Adapt as risk and context change Have tools that help you respond to those changes 1 2 3 4
  • 18. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better Adapt as risk and context change Have tools that help you respond to those changes 1 2 3 4
  • 19. THE IMPORTANCE OF RISK AND CONTEXT F O U R T H I N G S T O I M P R O V E B O T H S E C U R I T Y A N D E X P E R I E N C E Understand the risks better Understand the context better Be able to adapt as risk and context change Use tools that help you respond to those changes 1 2 3 4
  • 21. WHAT DOES OMNICHANNEL REQUIRE? M U LT I P L E S O L U T I O N S C E N T E R E D O N T H E C U S T O M E R ’ S D E V I C E Transparent, device-based authentication that provides context Risk-aware multifactor authentication that provides variable assurance 1 2 3
  • 22. WHAT DO WE MEAN BY “DEVICE -BASED”? M A C H I N E L E A R N I N G T H AT A U T H E N T I C AT E S A K N O W N D E V I C E Transparent device-based authentication eliminates friction for most users Turns your customer’s mobile device into a reliable possession factor Machine learning continuously assesses devices Highlights the risk and context of any device Adaptive, contextual response drives step-up authentication and subsequent actions MINIMUM THRESHOLD MAXIMUM THRESHOLD Original Device Print Returning Device Print
  • 23. WHAT DO WE MEAN BY “MULTIFACTOR”? M O B I L E - B A S E D A U T H E N T I C AT I O N T H AT D E L I V E R S A VA R I E T Y O F F A C T O R S Something you KNOW Something you HAVE Something you ARE
  • 24. Like what you’re hearing? Go to www.iovation/resources/videos to learn more… …Or click NEXT to continue with this slide share.
  • 25. AUTHENTICATION AND USER EXPERIENCE Lower Risk Higher Risk Transparent DEVICE-BASED AUTHENTICATION SERVICE Interactive MOBILE MULTIFACTOR AUTHENTICATION Real-time EXPLICIT AUTHORIZATION 80% 15% 5%
  • 29.
  • 30.
  • 31. Transparent DEVICE-BASED AUTHENTICATION SERVICE Interactive MOBILE MULTIFACTOR AUTHENTICATION Real-time EXPLICIT AUTHORIZATION
  • 32.
  • 33. I agree YOU ARE who you say you are…. But are you AUTHORIZED to do what you’re asking to do?
  • 34. Real-time Authorization For Multiple Authorizers OR A U T H O R I Z E I N D I V I D UA L O R G R O U P T R A N S A C T I O N S
  • 35. Transparent DEVICE-BASED AUTHENTICATION SERVICE Interactive MOBILE MULTIFACTOR AUTHENTICATION Real-time EXPLICIT AUTHORIZATION The Right Authentication for Every Channel and Every Level of Risk
  • 36. BENEFITS TO YOU AND YOUR CUSTOMERS
  • 37.  1,095 US Consumers  Mixed demographics  Priorities between ease- of-use and security  Authentication impacts  Willingness to pay for stronger authentication  What is their confidence? AITE REPORT N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
  • 38.  Ease of use is only marginally more important than security and fraud prevention  Equally true for all demographics  With regard to interactive authentication and authorization, Millennials and Seniors are alike in many respects AITE REPORT N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
  • 39.  There’s a high willingness to use alternate authentication methods …  And very few who are not at all willing AITE REPORT N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
  • 40.  Willingness to change increases as expected with an incentive in place AITE REPORT N E W R E S E A R C H I N T O C O N S U M E R P E R S P E C T I V E S
  • 41.  Usability is a competitive differentiator  Improved authentication enables your mobile application strategy  Your customers create more sessions ad transaction if authentication is not a barrier  Customer satisfaction is disproportionately based on digital experience WHEN CONSUMERS WIN … B U S I N E S S T E A M S A N D S E C U R I T Y T E A M S A L S O W I N  Start on a “path to passwordless”  Reduce costs by simplifying and unifying authentication and authorization experiences  Gradually reduce – and then eliminate – your on-premise credential stores  Leverage the risk and contextual insight the fraud prevention teams already generate Benefits for Business Leaders Benefits for Risk & Security Teams
  • 42.

Editor's Notes

  1. Authentication is simple in concept, but extraordinarily hard in practice. Especially when we consider authenticating large groups of external consumers. Three distinctions add complexity: Who’s corroborating? Which identity is being claimed, your enterprise identity or your Facebook identity? And How much assurance do we need, and for what request?
  2. When we we develop software or services for authentication we imagine that it looks like this: peaceful, graceful handover of credentials with a peaceful graceful – and fast! – corroborating check.
  3. In reality it looks like this. It’s frankly a bad experience for everyone. Lost passwords, failed captchas, KBA questions no one knows the answer to any more.
  4. This tug of war is complicated by stakeholders ranging from the CISO’s group, the security architects, the head or risk. Fortunately for the end user, product owners and UX experts are now weighing in on their behalf.
  5. Agenda today
  6. RISK: Depth of Field. I know there’s a VPN at work in this session, but is that bad? It depends on whether the session is violating velocity rules, like creating multiple new accounts.
  7. CONTEXT: Breadth of Field How can I get as much insight into every session as possible? The device seems normal, but why is the OS recently updated and the browser 6 versions old? Is an emulator at work?
  8. Understand that risk and context change routinely ….
  9. And that you need multiple authentication and detection tools working in a layered strategy to deal with these changes.