<img alt="" src="https://secure.hook6vein.com/218483.png" style="display:none;">

What is Contextual Authentication?

by Rob Bellefeuille 0 Comments

computer-Keyboard

 

With the increased need to protect confidential information from hackers, companies need to “toe-the- line” when it comes to implementing a strong solution that is both compliant and user friendly.

Two-factor authentication (2FA) supplies a strong authentication method, but is not always adopted easily by end users due to its inability to adapt to user access scenarios on-the-fly.  In addition to low adoption rate, 2FA can require help desk training along with the startup and maintenance costs of additional hardware. Leaving compliance teams with a tough decision, should they institute a better password policy or implement a 2FA solution companywide?

What if there was a solution that not only matched an organizations policies and compliance standards, but provided a dynamic solution that applied context to the authentication process? Thus providing a seamless and easy to use authentication option for all users.

PortalGuard provides such a feature know as Contextual Authentication. This authentication method takes into account the context of the end users access request.  This is achieved by identifying the user’s location, device, network, application, and time of day.  These parameters are leveraged to give access to an authorized user while creating major obstacles for unauthorized users. By utilizing this approach, password policies can be configured by the context in which users are logging in from and apply more factors for individuals that are accessing company data outside of the office.

This method of authentication not only provides an added level of security, it also gives easy access to users that are working with in the company building. Contextual Authentication provides the ability for a company to be compliant and provide a user friendly option for their employees. Deploying this authentication method allows you to “hassle the hackers, not the end users”.

Subscribe to the BIO-key blog!

Tags: Authentication, information security, #passwordmanagement, #passwords, PortalGuard, Two-Factor Authentication, User Authentication