By juggling different factors to rebalance the risk, you’re employing adaptive authentication: adapting to the current estimated level of risk at the time of login. If you think of authentication factors as being like a hand of cards, you can play the cards that you think are appropriate at each point in your game.
Different types of organizations have different threat profiles - instead of classic benchmarking, which can be problematic, researching and creating organizational personas can help us better understand how they approach security issues.
The WannaCry debacle and most recent MaybeNotPetya attack has revealed that there are countless unpatched systems - no big surprise. Here’s what’s keeping organizations vulnerable, and what we can do about it.
When you’re trying to parlay a multi-factor authentication (MFA) product into a solution that complies with current requirements and stays ahead of future ones, it’s hard to tell which way the ship is sailing.
In our first blog post introducing the BeyondCorp concept, we discussed what organizations should think about when trying it for themselves. In this post, we’ll talk about creating access policies.
BeyondCorp: If You Liked It, You Should Have Put a Cert On It Industry News / Featured Article
In this blog post, Wendy discusses how you can mark trusted devices with certificates in your organization as part of the BeyondCorp security model.
Learn about how to enroll your users and their endpoints using the Google BeyondCorp model.
How Google secured the perimeterless enterprise with BeyondCorp, and how Duo is now offering this new model of security to organizations everywhere.