© 2016 ForgeRock. All rights reserved.
Continuous Security
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Context
© 2016 ForgeRock. All rights reserved.
Dynamic
© 2016 ForgeRock. All rights reserved.
• Identity Attributes• Trusted Credentials• Knowledge• Variables• Perceived Risk• Incentive
© 2016 ForgeRock. All rights reserved.
Digital
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Identity’s Unique Role
User Experience Security
© 2016 ForgeRock. All rights reserved.
Identity’s Unique Role
© 2016 ForgeRock. All rights reserved.
FunctionExperience
Efficiency
PrivacyIntegrityAvailability
User Experience Security
© 2016 ForgeRock. All rights reserved.
AvailabilityExperience
FunctionEfficiency
PrivacyIntegrity
IntegrityAvailabilityPrivacyFunctionExperienceEfficiency
User Experience Security
© 2016 ForgeRock. All rights reserved.
The Thing about Things…
© 2016 ForgeRock. All rights reserved.
Gartner Strategic Planning Assumption
Enterprises to employ mobile biometric authentication methods
Organizations to use contextual, adaptive techniques with multi-factor authentication
35%
30%
5%
5%Today
Today
End 2016
End 2017
© 2016 ForgeRock. All rights reserved.
Connecting the Dots
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Strong Authentication
© 2016 ForgeRock. All rights reserved.
Mobile Biometrics
• Plugs directly into OpenAM
• Can be used with Adaptive Risk module
© 2016 ForgeRock. All rights reserved.
Adaptive Risk• Assesses risk based on
pre-configured parameters
• Requires additional authentication factors depending on risk score
• Includes over 20 parameters including IP address, IP history, cookie value, login history, Geo location etc.
© 2016 ForgeRock. All rights reserved.
Authentication: Modules and Chains• 20+ out-of-box modules including
device ID, OTP, adaptive risk, Google, Facebook, MS
• Authentication methods can be chained together for enforcing different levels or strength of security
• Scripted AuthN modules extend functionality on client side and server side using Groovy and Javascript
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Top Related