ThreatMetrix to Exhibit Context-Based Security Solutions at the Gartner Security and Risk Management Summit 2014

Posted on June 23rd, 2014 by Dan Rampe

The ThreatMetrix® Global Trust Intelligence Network Provides Enterprises with Real-Time Intelligence to Differentiate Between Authorized and Fraudulent Users

San Jose, CA – June 23, 2014 – ThreatMetrix®, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced it is exhibiting in booth 1010 at the Gartner Security and Risk Management Summit 2014, June 23-26 at Gaylord National Hotel in National Harbor, Md.

The summit brings together more than 1,600 security strategies and business leaders and features more than 50 Gartner analysts who will present research and insights on topics such as workforce access, bring-your-own-device (BYOD), identity management and more. Attendees will also have the opportunity to hear from special guest speakers, attend problem-solving workshops and roundtable forums and visit exhibition booths to learn from industry experts. The goal of the summit is for attendees to gain insight into the full spectrum of emerging trends in security and risk management.

According to Gartner, by 2016, more than 30 percent of enterprises will use contextual authentication for workforce access[Source: Gartner Magic Quadrant for User Authentication, December, 2013]. Attendees at the summit will have the opportunity to visit ThreatMetrix’s booth to learn about the company’s innovative context-based authentication solutions.

“Traditionally, the response to failed sign-on attempts in the enterprise has been to add complex and expensive step-up authentication processes to verify users, such as adding tokens or SMS out-of-band authentication ,” said Bert Rankin, chief marketing officer, ThreatMetrix. “This adds complexity and cost without necessarily protecting against password sharing or the use of stolen credentials. At the Gartner Summit, attendees will learn about ThreatMetrix’s context-based authentication capabilities, which offer all users secure, cost effective and frictionless access through real-time behavior and contextual analytics.”

To enhance the reach of its contextual authentication capabilities for enterprises, ThreatMetrix recently announced its integration with the Ping Identity PingFederate® identity bridge. The integration leverages context-based authentication and single sign-on, which enables enterprises to deliver transparent and frictionless access to their business portals, boosting productivity and security for all users.

ThreatMetrix’s context-based authentication and advanced fraud prevention solutions provide enterprises with frictionless workforce and consumer authentication. This is made possible by the following solutions:

  • Secure Workforce Access and Insider Threat Protection: Detects and prevents identity takeover and IP theft, enabling enterprises to safely extend access to partners and consultants and embrace emerging trends such BYOD without having to sacrifice security or productivity.
  • Payment Fraud Prevention: Provides businesses with a comprehensive visitor assessment, built on ThreatMetrix® Global Trust Intelligence Network (The Network). It employs a sophisticated process to screen out fraudsters while offering customers and employees frictionless access to mission critical applications.
  • Account Takeover Detection: ThreatMetrix’s user screening process includes analyzing every user sign-on and comparing device, behavior and identity data across The Network to identify and report anomalies. As a result, enterprises can be assured that user accounts have not been compromised.

For more information, visit ThreatMetrix at booth 1010 at the Gartner Security and Risk Management Summit 2014.

ThreatMetrix Resources

About ThreatMetrix

ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

© 2014 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.

Media Contacts
Dan Rampe
ThreatMetrix
Tel: 408-200-5716
Email: drampe@threatmetrix.com

Beth Kempton
WalkerSands Communications
Tel: 312.241.11178
Email: beth.kempton@walkersands.com

 

1,600 Plus Security Strategy and Business Leaders to See ThreatMetrix Solutions at Gartner Summit

Posted on June 23rd, 2014 by Dan Rampe

Gartner

 

ThreatMetrix to exhibit context-based security solutions at Gartner Security and Risk Management Summit 2014 June 23-26 National Harbor, MD

By 2016, according to Gartner, more than 30 percent of enterprises will use contextual authentication to verify members of their workforce who work remotely. ThreatMetrix, whose Global Trust Intelligence Network provides enterprises with real-time intelligence for differentiating between authorized and fraudulent users, will be at booth 1010 offering attendees the opportunity to learn about the company’s innovative context-based authentication solutions.

Bert Rankin, chief marketing officer, ThreatMetrix

“Traditionally, the response to failed sign-on attempts in the enterprise has been to add complex and expensive step-up authentication processes to verify users, such as adding tokens or SMS out-of-band authentication ,” said Bert Rankin, chief marketing officer, ThreatMetrix. “This adds complexity and cost without necessarily protecting against password sharing or the use of stolen credentials. At the Gartner Summit, attendees will learn about ThreatMetrix’s context-based authentication capabilities, which offer all users secure, cost effective and frictionless access through real-time behavior and contextual analytics.”

What the Summit is all about

At the Gartner Summit, 1600 plus security strategies and business leaders and more than 50 Gartner analysts will present research and offer their insights on topics such as workforce access, bring-your-own-device (BYOD) and identity management.

The goal of the summit is to give attendees an awareness of the full spectrum of emerging trends in security and risk management. To that end, attendees will be able to hear special guest speakers, and attend problem-solving workshops and roundtable forums. And, they’ll be able to visit exhibition booths to learn from industry experts.

Integrating Ping Identity with ThreatMetrix

Integrating Ping Identity’s PingFederate identity bridge with ThreatMetrix solutions leverages context-based authentication and single sign-on, enabling enterprises to deliver transparent and frictionless access to their business portals. This boosts productivity and security for all users.

Context-based authentication and advanced fraud prevention from ThreatMetrix

  • Secure Workforce Access and Insider Threat Protection: Detects and prevents identity takeover and IP theft, enabling enterprises to safely extend access to partners and consultants and embrace emerging trends such BYOD without having to sacrifice security or productivity.
  • Payment Fraud Prevention: Provides businesses with a comprehensive visitor assessment, built on ThreatMetrix® Global Trust Intelligence Network (The Network). It employs a sophisticated process to screen out cybercriminals while offering customers and employees frictionless access to mission critical applications.
  • Account Takeover Detection: ThreatMetrix’s user screening process includes analyzing every user sign-on and comparing device, behavior and identity data across The Network to identify and report anomalies. As a result, enterprises can be assured that user accounts have not been compromised.

For more information, visit ThreatMetrix at booth 1010 at the Gartner Security and Risk Management Summit 2014.

ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

 

ThreatMetrix Announces Integration with Ping Identity to Deliver Context-Based Authentication for Enterprises

Posted on June 17th, 2014 by Dan Rampe

The Combined Solution Provides Organizations with Secure, Transparent and Frictionless Access for Mobile and Online Users

San Jose, CA – June 17, 2014 – ThreatMetrix®, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announces its integration with the Ping Identity PingFederate® identity bridge, providing contextual employee authentication for enterprises.

Corporate network perimeters have virtually disappeared due to the evolution of bring-your-own-device (BYOD) and cloud-based applications that provide workforce, partner and contractor access. As a result enterprises must identify new approaches for securing access to corporate applications and digital assets. Gartner estimates that by year end 2016, more than 30 percent of enterprises will use contextual authentication for workforce access. The integration of ThreatMetrix and PingFederate leverages context-based authentication and single sign-on, enabling enterprises to deliver secure, frictionless access to their business productivity applications for all users.

“Until now, enterprises had to choose between maintaining high levels of access security and improving employee access and open BYOD polices – or they have already made the shift and are relying on weak, single-factor authentication,” said Alisdair Faulkner, chief products officer, ThreatMetrix. “As a result, many enterprises are at risk of having sensitive information compromised by cybercriminals accessing employee accounts with stolen credentials. The integration of ThreatMetrix’s context-based authentication with PingFederate’s identity bridge will greatly enhance security and transparency for enterprises without sacrificing employees’ ease of access and productivity.”

The new era of cybersecurity is all about enabling unfettered, yet protected, access to consumer services, business revenues, and productivity assets in a world where it should be assumed that traditional security protections are compromised. The combined solution between ThreatMetrix and Ping Identity delivers transparent and secure access for online and mobile users. Together, these solutions stop cybercriminals at the front door and provide legitimate users full access to all permissible resources in a managed and monitored fashion.

Ping-ID-wTitle

This integration works in three distinct steps:

  • At the point of sign-on, ThreatMetrix – in real time – analyzes the connecting device, associated online personas, transaction context and past behavior
  • This resulting analysis is used by a global policy engine that lets businesses define appropriate risk and trust levels to determine access
  • Based on achieving a predefined level of trust, users are granted access through Ping Identity’s PingFederate product to all their associated applications and online resources

“Ping Identity is pleased to see ThreatMetrix’s support for integrations that help its customers overcome the visibility and security challenges that have been introduced with BYOD,” said Patrick Harding, chief technology officer, Ping Identity. “By enabling federated single sign-on to enterprise and cloud-based apps, Ping Identity complements ThreatMetrix’s context-based security and advanced fraud prevention solutions with an integrated solution that enables our mutual customers to both authenticate and monitor employees accessing cloud applications from any device.”

According to Gartner, by 2015, the demand for greater security intelligence sharing for context-aware systems will form a marketplace for brokering security data. By leveraging The ThreatMetrix® Global Trust Intelligence Network, the most comprehensive information repository of authentication data, ThreatMetrix is one step ahead in offering intelligence sharing and can provide enterprises with real-time intelligence, effectively differentiating between authentic and fraudulent online activities.

ThreatMetrix Resources

About ThreatMetrix

ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

 

© 2014 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.

Media Contacts
Dan Rampe
ThreatMetrix
Tel: 408-200-5716
Email: drampe@threatmetrix.com

Beth Kempton
WalkerSands Communications
Tel: 312.241.11178
Email: beth.kempton@walkersands.com

 

Leading Independent Research Firm and ThreatMetrix to Host Webinar: “Context-Based Authentication for Mission-Critical Applications”

Posted on March 11th, 2014 by Dan Rampe

One-Hour Complimentary Webinar to Focus on How Organizations Can Protect Mission-Critical Applications When Usernames and Passwords Fail

San Jose, Calif. – March 11, 2014 – ThreatMetrix™, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced it is hosting a complimentary one-hour ThreatMetrix™ Cybercrime Education Series webinar on “Context-Based Authentication for Mission-Critical Applications,” featuring Andras Cser, Forrester vice president and principal analyst, and Alisdair Faulkner, ThreatMetrix chief products officer.

There’s no way of escaping today’s headline news that cybercriminals are breaching enterprise security and compromising customer and corporate accounts. The names of the victims are a who’s who of successful corporations: Target, Adobe, Neiman-Marcus, Michaels and many more. No type of organization – including retailers, government agencies, healthcare providers, banks and social networks – is exempt from cybercrime attacks.

“Cybercriminals and state-sponsored actors are becoming better organized and much more sophisticated than ever before,” said Faulkner. “Because the bad guys are at the ‘top of their game,’ security and risk professionals have to be at the top of theirs. To do so, businesses must look beyond traditional username and password protection and instead implement more effective security measures such as context-based authentication.”

Co-presenters Faulkner and Cser will address how context-based authentication protects mission-critical applications from hackers and other cybercriminals. They’ll discuss such vital subjects as:

• Trends in enterprise identity and access management

• Evolving challenges resulting from cloud-based applications and Bring-Your-Own-Device (BYOD)

• When two-factor authentication can be too much of a good thing

• Solutions to combine user information, devices and behavior for context-based authentication

The one-hour complimentary webinar will take place at 9 a.m. PDT/12 noon EDT on Thursday, March 13. Registration is required and can be secured here.

About ThreatMetrix

ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

© 2014 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.

Media Contacts
Dan Rampe
ThreatMetrix
Tel: 408-200-5716
Email: drampe@threatmetrix.com

Beth Kempton
WalkerSands Communications
Tel: 312.241.11178
Email: beth.kempton@walkersands.com

ThreatMetrix Announces Frictionless Context-Based Authentication Using World’s Largest Trusted Identity Network to Prevent Unauthorized Access to Enterprise Applications

Posted on February 20th, 2014 by Dan Rampe

Real-Time Identity Analytics and Federated Trust Combine Security, Low Total Cost of Ownership and Optimal User Experience

San Jose, Calif. – February 20, 2014 – ThreatMetrix™, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced a revolutionary offering that improves the security associated with traditional username and password protection for accessing enterprise applications in conjunction with the upcoming RSA Conference 2014, February 24-28 at Moscone Center, San Francisco.

With the advent of bring-your-own-device (BYOD) and cloud-based applications, today’s enterprise security professionals are challenged with augmenting the application access security that can be obtained through simple username and password verification and cumbersome two-factor authentication with minimal impact to the user experience.

“No enterprise wants to be called out for falling victim to a data breach, as it erodes trust,” said Reed Taussig, president and CEO, ThreatMetrix. “However, if enterprises implement time consuming authentication techniques, this will erode overall productivity and motivate the workforce to find ways around the authentication. This is where frictionless context-based authentication comes into play, which establishes trust for each account login based on fully anonymous user identity, device usage, geolocation, behavior and other factors without compromising consumer identity or workforce efficiency.”

Gartner estimates that by year end 2016, more than 30 percent of enterprises will use contextual authentication for remote workforce access. [Source: Gartner Magic Quadrant for User Authentication, December, 2013]

Overall, context-based authentication offers three essential benefits to enterprises. These include:

• Frictionless access – Real-time, passive assessment of the login context through frictionless two-factor authentication enables businesses to streamline access for known and trusted combinations of accounts and devices – reducing effort and inconvenience for the workforce by not requiring additional one-time passwords for each login.

• Increased security – Combining global federated trust identities with context-based authentication enables businesses to quickly and easily identify high-risk connections that have the potential to compromise corporate IP and valuable data. High-risk connections include devices that are part of botnets, use of spoofed and compromised identities or devices that are known to be involved with fraudulent access across the ThreatMetrix™ Global Trust Intelligence Network (The Network).

• Operational Efficiency – Real-time API-driven big data analytics means actionable intelligence at the point of control, rather than information being stored in a data warehouse.

“Enterprise adaptive access control combines contextual information and user credentials to evaluate the risk of users attempting to access resources. Once the purview of e-commerce and financial services, adaptive access is finding an increased role in workforce identity — particularly for mobile device use cases.” [Source: “Adaptive Access Control Brings Together Identity, Risk and Context,” Gartner: Trent Henry, August 2013]

ThreatMetrix is uniquely positioned to provide one of the most powerful context-based authentication and fraud prevention solutions on the market. The solution leverages the vast amount of data in The Network, one of the largest fully anonymized global identity and fraud networks in the world. Through The Network, ThreatMetrix protects more than 160 million active user accounts, 2,500 customers and 10,000 websites.

“All ThreatMetrix customers benefit from anonymized shared identity and threat data worldwide across The Network, increasing the quality and value of the data as The Network grows,” said Taussig. “Due to shared data on The Network, in the United States, for example, we have an 80 percent recognition rate for users attempting an account login. This means that for four in five logins, ThreatMetrix recognizes at least one anonymized data point from previous activity in The Network – such as the email address, telephone number or account name. This offers enterprises and other businesses a full 360 degree assessment of a user’s risk to more accurately differentiate between hackers and valid workforce access.”

Federating identities without federating trust creates many opportunities for cybercrime. Combining context-based authentication and a global federated identity network is the most efficient and cost effective way for enterprises to reduce the threat of data breaches from unauthorized application access, eliminating employee friction. This includes protection against both internal and external threats, since enterprises now face risks from employees who jeopardize regulatory compliance through unauthorized password sharing and other risky behaviors.

In addition to its evolution as a context-based authentication provider for enterprises, ThreatMetrix continues to build trust on the Internet by protecting businesses across industries, including financial services, e-commerce, payments, social networks, government agencies and social networks, through advanced online fraud prevention. This solution offers protection against threats including account takeover, payment fraud, fraudulent account registration and multi-channel Web fraud.

To learn more about ThreatMetrix’s context-based authentication and advanced fraud solutions, stop by booth 232 in the South Expo at RSA Conference 2014. During the conference, ThreatMetrix is also a proud sponsor of the Alta Associate’s Executive Women’s Forum Reception, which takes place Wednesday, February 26, 7-9 p.m. at the W Hotel in San Francisco.

About ThreatMetrix

ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blog, Facebook, LinkedIn and Twitter pages.

© 2014 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.

Media Contacts

Dan Rampe
ThreatMetrix
Tel: 408-200-5716
Email: drampe@threatmetrix.com

Beth Kempton
WalkerSands Communications
Tel: 312.241.11178
Email: beth.kempton@walkersands.com

Millennial Workforce Increasingly Adopts BYOD, Showing Nonchalant Attitude Towards Password and Security Policies

Posted on October 16th, 2013 by Dan Rampe

Continuing Its Alignment to National Cyber Security Awareness Month’s Weekly Themes, ThreatMetrix Outlines the Ways Businesses Can Reap the Benefits of BYOD in the Workforce

San Jose, Calif. – October 16, 2013 – ThreatMetrix™, the fastest-growing provider of integrated cybercrime solutions, continues its commitment to National Cyber Security Awareness Month by aligning to the week three theme, “Cyber Workforce and the Next Generation of Cyber Leaders.”

The U.S. Bureau of Labor Statistics projects the millennial generation will dominate the workforce by 2015 – and they’ll be bringing with them a whole new attitude about technology and cybersecurity. This includes a nonchalant attitude towards passwords and security, and an insistence on using their own devices – the Bring-Your-Own-Device (BYOD) challenge.

“When we first started talking about BYOD, there was a lot of resistance and concern from businesses from a security standpoint – very few devices were known and approved by IT,” said Andreas Baumhof, chief technology officer, ThreatMetrix. “However, with more insistence from the evolving workforce, companies began warming up to the idea, realizing BYOD can lead to a more productive workforce and lower costs. Initially, BYOD policies were responding to the needs of the employee only. Companies are now beginning to understand how to create policies around the intersection of the employee and the enterprise.”

Unfortunately, the major issue for companies implementing BYOD policies still lies in security. Early BYOD programs were focused on restricting and controlling devices themselves, but companies quickly learned that approach wasn’t scalable. The devices themselves do not fall under IT’s control, and with mobile devices changing at such a rapid pace, it is impossible for companies to keep up.

According to Baumhof, to implement secure BYOD policies, companies need to focus on the factors they can control:

Logins – Make sure to have secure login systems across all devices. For example, don’t sacrifice security for convenience on mobile logins. Webmail and SSL-VPN’s are a common entry point for attackers.

Transactions – Identify high risk transactions, and implement technologies that can identify these across multiple applications with different security requirements.

Data – Design policies about who can access which data in which situations and implement technologies that can help by watching each login and transaction automatically.

“BYOD is a result of a generation that grew up with technology coming into the workforce,” said Baumhof. “This is a culture clash for many enterprises. BYOD is the first step towards a fully integrated approach of employees and enterprises working together for the benefit of both – in the most productive way possible.”

This will be a major shift in the industry and ThreatMetrix sees the rapid growth of BYOD in the workforce going hand-in-hand with this week’s National Cyber Security Awareness Month theme – “Cyber Workforce and the Next Generation of Cyber Leaders” – as ThreatMetrix aligns with the Department of Homeland Security’s emphasis on the importance of cyber security, no matter what device data is accessed from.

For more information on National Cyber Security Awareness Month, visit: http://www.dhs.gov/national-cyber-security-awareness-month or http://staysafeonline.org/ncsam/.

About ThreatMetrix

ThreatMetrix™ secures Web transactions against account takeover, payment fraud, identity spoofing, malware, and data breaches. The ThreatMetrix™ Global Trust Intelligence Network, which analyzes 500 million monthly transactions, provides context-based authentication and Web fraud prevention to help companies accelerate revenue, reduce costs and eliminate friction. ThreatMetrix protects more than 1,900 customers and 9,000 websites across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government, and insurance. For more information, visit www.threatmetrix.com or call 1-408-200-5755.

To join in the cybersecurity conversation, follow us on Twitter @ThreatMetrix.

© 2013 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.

Media Contacts

Dan Rampe
ThreatMetrix
Tel: 408-200-5716
Email: drampe@threatmetrix.com

Tory Patrick
WalkerSands Communications
Tel: 312-533-9823
Email: tory.patrick@walkersands.com

 

 

 

Millennials, BYOD and Cybersecurity

Posted on October 16th, 2013 by Dan Rampe

blog-banner-10-14

According to the U.S. Bureau of Labor Statistics, the millennial generation (born roughly between 1980 and 2000) will make up the largest part of the U.S. workforce by 2015. What does this mean from a cybersecurity perspective?

The theme of this week’s National Cyber Security Awareness Month is “Cyber Workforce and the Next Generation of Cyber Leaders.” It’s worth pausing to think about the effect of the next generation on cybersecurity.

People in the millennial generation have grown up with a vastly different relationship with technology than the rest of us.

• They are accustomed to sharing personal information on social networks, often from an early age.

• They may be less careful with passwords, having an attitude that it’s easier to fix problems after the fact.

When I watch my young son working effortlessly on an iPad, it’s clear that the biggest issue with this younger generation in the workforce will be their insistence on using their own devices – the Bring Your Own Device or BYOD challenge.

Millennials and the “New” BYOD

I just read “BYOD As We Know It is Dead” by my friend Bob Egan – and I completely agree with his assessment that businesses are changing how they perceive BYOD. After a period of initial resistance and concern (BYOD 1.0), businesses are starting to understand the real benefits – a more productive workforce, and lower costs.

But security is still the sticking point for man businesses. They’re trying to answer questions like:

• How do you force someone to install a corporate anti-virus solution if you don’t own the device?

• How can you make sure no confidential information is lost through the device, when it is shared with personal applications? (See my blog from last week on the threats of mobility.)

• How do you let insecure mobile devices into your applications?

Focus on What You Can Control

Early BYOD programs focused on restricting and controlling the personal devices themselves. That’s approach doesn’t scale well. The devices themselves are, by definition, outside of IT’s control. And mobile devices change so quickly, it’s virtually impossible to keep current.

To get to a BYOD 2.0 environment, where people can use their own devices for work freely and securely, businesses have to focus on the things that they can control:

• Logins

• Transactions

• Data

This requires a combination of technology and policy. For example, you’ll need to define policies about who can access which data, and in which situations. But there are technologies today that can help by verifying each login and transaction automatically.

For example, if you can make sure that everyone logging into your business applications is, in fact who they claim to be, you’ve reduced a lot of risk. If you can then make sure that they aren’t using compromised devices, you’ve gone a lot further.

By the time my son gets his job, who knows what devices he’ll be using to work? I’m simply hoping that the online environment is secure enough to give him options.

ThreatMetrix™ secures Web transactions against account takeover, payment fraud, identity spoofing, malware, and data breaches. The ThreatMetrix™ Global Trust Intelligence Network, which analyzes 500 million monthly transactions, provides context-based authentication and Web fraud prevention to help companies accelerate revenue, reduce costs and eliminate friction. ThreatMetrix protects more than 1,900 customers and 9,000 websites across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government, and insurance. For more information, visit www.threatmetrix.com or call 1-408-200-5755.

To join in the cybersecurity conversation, follow us on Twitter @ThreatMetrix.