{"id":439,"date":"2016-09-22T16:46:01","date_gmt":"2016-09-22T15:46:01","guid":{"rendered":"http:\/\/swivelsecure.com\/?p=439"},"modified":"2019-01-22T11:29:07","modified_gmt":"2019-01-22T11:29:07","slug":"adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits","status":"publish","type":"post","link":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/","title":{"rendered":"Adaptive and multi-factor authentication: What is the difference and what are the benefits?"},"content":{"rendered":"<p>Understand multi-factor authentication (MFA) but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what all adaptive noise is about? Read on\u2026<\/p>\n<p><strong>MFA &amp; adaptive authentication: what\u2019s the difference?<\/strong><\/p>\n<p>Think of it like this: Adaptive authentication is an evolved form of MFA.\u00a0 It applies the principles of MFA, but instead of issuing blanket procedures for everyone to follow under all circumstances, it issues challenges intelligently instead, according to a predetermined risk model. This enables an organisation to apply precisely the right level of gateway security to each and every login request.<\/p>\n<p>An adaptive system is purpose-built to measure the risk of a user\u2019s login, along with their post-login activities, to determine the level of risk their access request poses to the business. Appropriate levels of authentication are then triggered to protect an organisation\u2019s data, websites, portals, browsers and applications.<\/p>\n<p><strong>What are the benefits of adaptive authentication?<\/strong><\/p>\n<p>There are a variety of significant benefits that set adaptive authentication apart from traditional multi-factor authentication:<\/p>\n<p><strong><em>It optimises the user\u2019s security experience.<\/em><\/strong><\/p>\n<p>None of us want our network experience to be inhibited by needlessly heavy-handed levels of authentication. At the same time, however, we all accept that some access requests require more security than others. Adaptive authentication enables precisely the most appropriate level of \u2018friction\u2019 to be applied to each and every access request. Looking beyond traditional binary authentication to adaptive risk-based solutions allows companies to maintain strong data security but not at the expense of usability.<\/p>\n<p><strong><em>It enables the IT department to embody an organisation\u2019s risk policies.<\/em><\/strong><\/p>\n<p>An organisation can lock down its most sensitive gateways with strong multi-factor authentication, ensuring only those with network clearance can participate in the authentication process (blocking entry completely for everyone else). At the same time, unfettered access (or a weaker form of authentication like a username and password) can be applied when access to non-sensitive data is requested.<\/p>\n<p><strong><em>It solves the BYOD security headache.<\/em><\/strong><\/p>\n<p>In the age of BYOD, everyone wants to access corporate data remotely, from different devices.<\/p>\n<p>Not only can adaptive authentication differentiate between different mobile devices (and their varying security vulnerabilities) it can also address the risks associated with the remote access networks used to connect to the corporate gateway. For example, if an employee uses a lower risk connection, like connecting their work-protected laptop to the corporate network while in the head office, an adaptive authentication platform could apply only a basic authentication challenge, such as a username and password. Should that employee switch to their personal smartphone, however, and attempt to connect beyond the network perimeter, via Starbucks public Wi-Fi, for example, an adaptive authentication platform would automatically recognise the increased in risk and apply a stronger authentication challenge before granting access, if indeed it grants it at all. All such scenarios can be planned for, assessed for risk, and dealt with accordingly.<\/p>\n<p><strong><em>It evolves in line with the evolution of the business.<\/em><\/strong><\/p>\n<p>With an adaptive authentication solution, the benefits of mobility and remote access can be harnessed without sacrificing security. Need to expand a remote workforce? No problem. The Board approves a new remote working policy? Great \u2013 let\u2019s set the risk parameters and enable everyone to connect in the most convenient manner possible. Need to respond to an overseas cyber threat? Now you can do so precisely by locking down access requested that conform to a defining set of criteria, enabling the rest of the business to continue to function uninterrupted.<\/p>\n<p><strong>Who uses adaptive authentication?<\/strong><\/p>\n<p>Adaptive authentication has been successfully applied to verify the identity of access requestors across a variety of different sectors, particularly in government services and banking. As the popularity of the system increases, so too does the information gathered in order to provide a risk-of-fraud assessment. Information such as geo-locations, behavioural profiling and device profiling allow for an increasingly varied data range that is enabling adaptive authentication to become perpetually smarter and more efficient.<\/p>\n<p>Keen to learn more? Check out our approach to adaptive authentication\u00a0<a href=\"https:\/\/www.swivelsecure.com\/product-features\/adaptive-authentication\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understand multi-factor authentication (MFA) but not adaptive authentication? Not sure &hellip;<\/p>\n","protected":false},"author":2,"featured_media":440,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Adaptive and multi-factor authentication: Difference &amp; Benefits<\/title>\n<meta name=\"description\" content=\"Understand multi-factor authentication but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what adaptive noise is about? Read on\u2026\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adaptive and multi-factor authentication: What is the difference and what are the benefits?\" \/>\n<meta property=\"og:description\" content=\"Understand multi-factor authentication but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what adaptive noise is about? Read on\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/\" \/>\n<meta property=\"og:site_name\" content=\"Swivel Secure Russian\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-22T15:46:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-22T11:29:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victoria Laws\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victoria Laws\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/\",\"url\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/\",\"name\":\"Adaptive and multi-factor authentication: Difference & Benefits\",\"isPartOf\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg\",\"datePublished\":\"2016-09-22T15:46:01+00:00\",\"dateModified\":\"2019-01-22T11:29:07+00:00\",\"author\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\"},\"description\":\"Understand multi-factor authentication but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what adaptive noise is about? Read on\u2026\",\"breadcrumb\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#primaryimage\",\"url\":\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg\",\"contentUrl\":\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swivelsecure.com\/ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adaptive and multi-factor authentication: What is the difference and what are the benefits?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#website\",\"url\":\"https:\/\/swivelsecure.com\/ru\/\",\"name\":\"Swivel Secure Russian\",\"description\":\"Protecting Identities with Intelligent Authentication\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swivelsecure.com\/ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\",\"name\":\"Victoria Laws\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"caption\":\"Victoria Laws\"},\"url\":\"https:\/\/swivelsecure.com\/ru\/blog\/author\/v-laws\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Adaptive and multi-factor authentication: Difference & Benefits","description":"Understand multi-factor authentication but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what adaptive noise is about? Read on\u2026","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Adaptive and multi-factor authentication: What is the difference and what are the benefits?","og_description":"Understand multi-factor authentication but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what adaptive noise is about? Read on\u2026","og_url":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/","og_site_name":"Swivel Secure Russian","article_published_time":"2016-09-22T15:46:01+00:00","article_modified_time":"2019-01-22T11:29:07+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg","type":"image\/jpeg"}],"author":"Victoria Laws","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Victoria Laws","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/","url":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/","name":"Adaptive and multi-factor authentication: Difference & Benefits","isPartOf":{"@id":"https:\/\/swivelsecure.com\/ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#primaryimage"},"image":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#primaryimage"},"thumbnailUrl":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg","datePublished":"2016-09-22T15:46:01+00:00","dateModified":"2019-01-22T11:29:07+00:00","author":{"@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514"},"description":"Understand multi-factor authentication but not adaptive authentication? Not sure where one term ends and the other begins? Keen to know what adaptive noise is about? Read on\u2026","breadcrumb":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#primaryimage","url":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg","contentUrl":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/onetouch_push_accept_screen_new.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2016\/09\/22\/adaptive-and-multi-factor-authentication-what-is-the-difference-and-what-are-the-benefits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swivelsecure.com\/ru\/"},{"@type":"ListItem","position":2,"name":"Adaptive and multi-factor authentication: What is the difference and what are the benefits?"}]},{"@type":"WebSite","@id":"https:\/\/swivelsecure.com\/ru\/#website","url":"https:\/\/swivelsecure.com\/ru\/","name":"Swivel Secure Russian","description":"Protecting Identities with Intelligent Authentication","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swivelsecure.com\/ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514","name":"Victoria Laws","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","caption":"Victoria Laws"},"url":"https:\/\/swivelsecure.com\/ru\/blog\/author\/v-laws\/"}]}},"_links":{"self":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts\/439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/comments?post=439"}],"version-history":[{"count":0,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts\/439\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/media\/440"}],"wp:attachment":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/media?parent=439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/categories?post=439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/tags?post=439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}