Strong Security Vs. User Experience: Finding The Right Balance

Authentication Methods That Can Help Or Harm Your Organization’s User Experience

Different strong authentication methods yield varying user experiences. Understand the trade-offs and what works best for your organization, your customers, and your employees.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
September 18, 2019
01:00 PM - 02:00 PM EST

Sponsored By:

All enterprises must balance their need of authentication practices with ensuring a frictionless user login process. That is because there is a fine line between maintaining the essential strong security posture for user accounts, while also ensuring a positive user experience — especially as people are critical in maintaining that posture. According to respondents of an Akamai/Ponemon Institute survey:

“71% said that preventing credential stuffing attacks is difficult because fixes that prevent such action might diminish the web experience for legitimate users.”

Different strong authentication methods yield varying user experiences: That is why, during this web seminar we will explore 2FA, MFA, Adaptive Authentication, Biometrics, Credential Screening and more to help you understand what works best for your organization, your customers, and your employees.

It is a simple fact that strong authentication will impact user experience and effectiveness. However, with various authentication methods your organization can now manage how significant that impact is for the user, in order to find the most secure balance.

Attendees will learn about:

  • Examples of user friction during authentication
  • The pros and cons of different authentication security tools
  • The differences in how industries are approaching authentication
  • What other enterprise organizations are doing to address the UX challenge

 

Presenters:

Michael Welch
Global Chief Information Security Officer (CISO)
OSI Group, LLC

Provide vision and leadership for developing and supporting security initiatives and their overall alignment with the OSI business strategy. Act as advocate and primary liaison for the OSI security vision with executives, department heads and end users. Work with business leaders and direct the planning and implementation of enterprise IT systems, business operations and facility defenses against security breaches and vulnerability issues. Perform auditing of existing systems and building the compliance framework for the GDPR regulation. Development of security policies, activities and standards for both a proactive and reactive security posture.

Dave Swift
VP of Engineering
The Grommet
Josh Horwitz
Chief Operating Officer
Enzoic
Entrepreneur and software executive with twenty years experience in both technology and marketing positions for start-ups and the Fortune 500. Co-founder of a security software start-up focused on network vulnerability and fraud risks caused by stolen login credentials. Previously founded a B2B SaaS company offering a customer-marketing platform to clients included Microsoft, Siemens, and Dell. Grew the business from inception through profitability and to its acquisition.
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.