- San Jose Sharks Welcome ThreatMetrix As the Team’s Newest Corporate Partner
- ThreatMetrix Selects Verne Global to Expand Data Center Footprint
- Digital Identity Summit 2017: Brian Krebs Named as Keynote as Call for Speakers and Award Nominations Open
- Top 5 Reasons to Vote ThreatMetrix for the MRC People’s Choice Technology Award!
- Organized Fraud Rings Target Online Lenders and Emerging Financial Services, Reveals New ThreatMetrix Report
Bring-your-own-device (BYOD), cloud-based apps and providing access to a remote workforce as well as contractors and partners have given hackers new opportunities for attacking enterprises.
ThreatMetrix and Ping Identity integrated solution
Gartner estimates that by year end 2016, more than 30 percent of enterprises will use contextual authentication for remote workforce access. Now ThreatMetrix and Ping Identity’s PingFederate® identity bridge offer an integrated approach to authenticating partners, and employees and contractors who work remotely. This integration leverages context-based authentication and single sign-on and makes it possible for enterprises to deliver secure, frictionless access to their business productivity applications.
“Until now, enterprises had to choose between maintaining high levels of access security and improving remote access and open BYOD polices – or they have already made the shift and are relying on weak, single-factor authentication,” said Alisdair Faulkner, chief products officer, ThreatMetrix. “As a result, many enterprises are at risk of having sensitive information compromised by cybercriminals accessing employee accounts with stolen credentials. The integration of ThreatMetrix’s context-based authentication with PingFederate’s identity bridge will greatly enhance security and transparency for enterprises without sacrificing employees’ ease of access and productivity.”
Open and protected access
When it can be assumed that traditional security protections are compromised, the ThreatMetrix and Ping Identity solution is all about enabling open and protected access to consumer services, business revenues and productivity assets. Here is transparency and a secure access to online and mobile users that stops cybercriminals “at the front door” while providing legitimate users full access to all permissible resources. And it does it in a managed and monitored fashion.
This integration works in three distinct steps:
- At the point of sign-on, ThreatMetrix – in real time – analyzes the connecting device, associated online personas, transaction context and past behavior
- This resulting analysis is used by a global policy engine that lets businesses define appropriate risk and trust levels to determine access
- Based on achieving a predefined level of trust, users are granted access through Ping Identity’s PingFederate product to all their associated applications and online resources
“Ping Identity is pleased to see ThreatMetrix’s support for integrations that help its customers overcome the visibility and security challenges that have been introduced with BYOD,” said Patrick Harding, chief technology officer, Ping Identity. “By enabling federated single sign-on to enterprise and cloud-based apps, Ping Identity complements ThreatMetrix’s context-based security and advanced fraud prevention solutions with an integrated solution that enables our mutual customers to both authenticate and monitor employees accessing cloud applications from any device.”
The ThreatMetrix Global Trust Intelligence Network
According to Gartner, by 2015, the demand for greater security intelligence sharing for context-aware systems will form a marketplace for brokering security data. By leveraging The ThreatMetrix Global Trust Intelligence Network, the most comprehensive information repository of authentication data, ThreatMetrix is one step ahead in offering intelligence sharing and can provide enterprises with real-time intelligence, effectively differentiating between authentic and fraudulent online activities.