Blog Home > Authentication Security > A Call to Arms – Contextual Authentication
Contextual Authentication

A Call to Arms – Contextual Authentication

Contextual Authentication

 

As Protector of your realm, you stand high upon the stone walls that overlook the sprawling expanse of your kingdom. You admire all that you have accomplished thus far, but maintain a constant vigil over those you are sworn to protect is never ending. You are always wary of the dangers that lurk just beyond the reach of your protection. You can forever sense the undead lurking in the recesses of the shadows, waiting, plotting their next inevitable attack.

 

The burden of this responsibility weighs heavy upon your mighty shoulders, IT Hero, but you are not alone. There are others just like you that have taken up arms in the fight against the undead. They too have created beacons of security within their kingdoms and share the burden that you know all too well. Even a colossal kingdom, as resourceful as yours, needs to forge the bonds of friendship beyond the sanctuary of your walls. This is imperative to the survival of your kingdom for no one can stand alone forever.

 

From the safeguards put in place and the training you bestowed upon your kingdom, an elite group of special operatives have emerged. These expert warriors are able to skillfully traverse the riddled landscape of pitfalls and provide a safe passage to your diplomats. They securely and stealthily allow your diplomats to VPN in, unimpeded, to your kingdom. All the while providing invisible barriers to ward off the horde of undead trying to force their way in to your kingdom.

 

A feat such as this is accomplished with risk based or contextual authentication. This elite guard grants your diplomats secure access by taking into account the context of how they login. Credibility scores are assessed for each Diplomat logging in from a VPN. These scores take in to account the following criteria: the time of day, their location, logging in with a registered device, and if they are on a secure network. This allows your Diplomat to go about their duties unhindered, and still provide the level of security needed to protect your people and assets.

 

When your diplomats bravely venture beyond the refuge of your castle, you will now rest easy for the strength and cunningness of your elite operatives will repel the onslaught of the undead.

Please follow and like us:
0
Jason Garfagna

Author: Jason Garfagna

Jason is a Project Manager at PistolStar, Inc. in Bedford, NH. He received a degree in Marketing from Mt. Washington College and spent over eight years as a manager of sales in the customer service industry. His current position has him focusing on providing authentication solutions to companies worldwide.

Comments are closed.

Main menu