Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

22
IDENTITY

Transcript of Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

IDENTITY

IDENTITY CARDS

DIGITAL IDENTITY

SOCIAL LOGIN

BY SECTOR

TAKEOVER OF SOCIAL LOGIN

50%USE

social login

90%SEEN

social login 2 BILLIONUSE

social login

75%WORLDinternet users

SOCIAL MEDIA CYBER ATTACKS

36%SOCIAL NETWORK USERS

HAVE ACCEPTED FRIEND

REQUESTS FROM

PEOPLE THEY DO NOT

KNOW

1/6SOCIAL NETWORK USERS

REPORT THAT SOMEONE

HAS HACKED INTO THEIR

PROFILE AND

PRETENDED TO BE THEM

4/10SOCIAL NETWORK USERS

HAVE FALLEN VICTIM TO

CYBERCRIME ON SOCIAL

NETWORK PLATFORMS

SOCIAL MEDIA CYBER ATTACKS

Impersonations• Fake accounts use a organization’s logo to spread

malware and phishing to customers

Executive Impersonators• Executive impersonator gains followers over the course

of months, announces company is going belly up

SOCIAL MEDIA CYBER ATTACKS

Customer Service Scams• Fake customer service accounts target customers or

other customer service reps

Sensitive Information• Sensitive or noncompliant information, true or false, sent

to stakeholders

THE CHALLENGE

IRS• Name• Social Security Number or

Individual Tax ID Number (ITIN)• Date of Birth• Filing Status• Mailing Address• Third Party Verification

Questions

WHAT YOU GET

ZEROFOX ENTERPRISEZEROFOX SECURITY

INTELLIGENCEZEROFOX CONTINUOUSIDENTITY PROTECTION

HOW WE SOLVE THE PROBLEM

ZEROFOX

SECURITY ENFORCEMENT

ANALYTICS &EVENT MGMT

CONTEXT BREEDS CONFIDENCE

Driven by expert models, supervised machine learning and malware and phishing detection technology, the Security Analysis Engine identifies never before seen attacks and

camouflaged threats.

ZEROFOX CONTINUOUS IDENTITY PROTECTION

HIGHLIGHTS• Real-time security analysis of users

as they attempt to log in to an application.

• Assess each identity for behavioral and technical threat indicators to identify elevated risk levels.

• Find malicious or fraudulent behavioral indicators in a user’s network.

FORGEROCK INTEGRATION

ZeroFOX conducts real-time security analysis of each user as they attempt to log in, empowering ForgeRock to:• Monitor and enhance

controls around high risk users

• Shut out compromised accounts

• Identify malicious actors• Have a comprehensive

risk profile of each user

CONTACT US

Global HQ1111 Light St., 3rd FloorBaltimore, MD 21230

855-ZFOX-FOX [email protected]