Multi-factor & Risk-based Authentication , Next-Generation Technologies & Secure Development

The Growth of Adaptive Authentication

OneSpan's Tim Bedard on Evolutionary Strategies and Controls
Tim Bedard, director, security product marketing, OneSpan

The right authentication controls at the right time for the right transactions - the adaptive authentication message is taking off, says OneSpan's Tim Bedard. And here are some quick wins organizations might focus on when starting down the path.

See Also: The State of Enterprise Mobile App Security 2023: Results Analysis

For organizations that are still dependent on usernames and passwords, it's time to start weening off those controls, Bedard says. "You want to start doing layered security," he says. "What I mean by that is to bring in additional adaptive authentication-type methods, so that you actually ... start to use some soft tokens, hard tokens or some biometrics ..." to enhance your approach.

In a video interview at Information Security Media Group's recent Fraud and Breach Summit in Chicago, Bedard discusses:

  • Quick wins for adaptive authentication;
  • Authentication technologies he's bullish on;
  • How OneSpan is helping organizations update their authentication strategies.

Bedard is the director of security product marketing at OneSpan, responsible for its Trusted Identity Platform security solutions for financial services. With more than 20 years of IT security experience, he previously held leadership positions in product strategy, product management and marketing at SailPoint Technologies, RSA Security and CA Technologies.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.