Rethinking MFA: Continuous security monitoring beyond devices

Ty Chaston
October 28, 2020

Get the latest from the SecureAuth Blog

Your organization likely has some form of continuous security monitoring in place in order to give IT security teams a real-time view of any device attempting to connect to the network. The need for continuous insight is necessary to proactively resolve vulnerabilities associated with unsafe or unauthorized devices. And it’s not just about evaluating each attempt, but recognizing patterns and ongoing suspicious activity as to better monitoring for the future. 

Yet once an approved device is connected, there is seldom continuous authentication confirming whether the person behind an approved device is legitimate. According to the 2020 Global Identity and Fraud Report by Experian, 57% of enterprises report higher fraud losses due to account takeover. This means that traditional 2-factor and multi-factor authentication approaches are allowing threat actors to slip through the cracks. Without a way to monitor access post-authentication, how can IT security teams know if an account has been breached by an imposter? 

If your authentication stops after an initial authorization, it might be time to rethink your identity access management strategy for employees, partners and customers. 

Download the full report to learn more about how your peers are approaching MFA and CIAM in these unpredictable times:

 

What do your peers think?

Pulse and Acceptto surveyed 100 security leaders to understand the authentication and identity & access management changes they face, and the rising popularity of continuous, passwordless authentication.

If you’re thinking you need to level up your authentication strategy, you’re not alone. Due to the inadequacy of one-time authorization methods—like passwords and 2FA—90% of security executives agree that intelligent MFA would help them better protect company resources.

 

 

Identity is more than just passwords and tokens — identity is defined by authentic behavior. More security leaders are waking up to this reality and are re-evaluating MFA and CIAM approaches. 

Download the full report

Related Stories

Pin It on Pinterest

Share This