Strong Security Vs. User Experience: Finding The Right Balance

Authentication Methods That Can Help Or Harm Your Organization’s User Experience

Different strong authentication methods yield varying user experiences. Understand the trade-offs and what works best for your organization.

This webinar will take place on:
01:00 PM - 02:00 PM EST

All enterprises must balance their need of authentication practices with ensuring a frictionless user login process. That is because there is a fine line between maintaining the essential strong security posture for user accounts, while also ensuring a positive user experience — especially as people are critical in maintaining that posture. According to respondents of an Akamai/Ponemon Institute survey:

“71% said that preventing credential stuffing attacks is difficult because fixes that prevent such action might diminish the web experience for legitimate users.”

Different strong authentication methods yield varying user experiences: That is why, during a web seminar on September 18, 2019, we will explore 2FA, MFA, Adaptive Authentication, Biometrics, Credential Screening and more to help you understand what works best for your organization.

It is a simple fact that strong authentication will impact user experience and effectiveness. However, with various authentication methods your organization can now manage how significant that impact is for the user, in order to find the most secure balance.

Attendees will learn about:

  • Examples of user friction during authentication
  • The pros and cons of different authentication security tools
  • The differences in how industries are approaching authentication
  • What other enterprise organizations are doing to address the UX challenge

Can’t attend our webinar? If you register now, you will receive an alert when it is ready to view on-demand.


Michael Welch
Global Chief Information Security Officer (CISO)
OSI Group, LLC

Provide vision and leadership for developing and supporting security initiatives and their overall alignment with the OSI business strategy. Act as advocate and primary liaison for the OSI security vision with executives, department heads and end users. Work with business leaders and direct the planning and implementation of enterprise IT systems, business operations and facility defenses against security breaches and vulnerability issues. Perform auditing of existing systems and building the compliance framework for the GDPR regulation. Development of security policies, activities and standards for both a proactive and reactive security posture.

Josh Horwitz
Chief Operating Officer
Entrepreneur and software executive with twenty years experience in both technology and marketing positions for start-ups and the Fortune 500. Co-founder of a security software start-up focused on network vulnerability and fraud risks caused by stolen login credentials. Previously founded a B2B SaaS company offering a customer-marketing platform to clients included Microsoft, Siemens, and Dell. Grew the business from inception through profitability and to its acquisition.
Michael Greene

Michael Greene is a growth-oriented CEO and General Manager with extensive experience across the organization from product and operations to sales and marketing - in a variety of international high growth companies.

Michael is currently CEO of Enzoic (formerly PasswordPing), a cyber-security startup that screens logins for compromised credentials. Prior to Enzoic, he was the CEO of ID Watchdog, an identity theft protection company that was sold to Equifax in 2017. Before IDWatchdog, Michael held senior management positions at Symantec, Webroot, Thompson Micromedix, Raindance and Baxter.

Michael graduated with an MBA from the University of Colorado in 2000 and has a BA in Biology.  He lives in beautiful Boulder, Colorado with his wife and 2 sons.