Building Resilient Identity Systems: Lessons from Securing Billions of Authentication Requests

As workforce becomes more digital,  identity security has become the center of enterprise cyber security. This is particularly challenging given that more than 40 billion authentication requests are processed each day, across platforms and devices, and more solutions than ever are being created in order to successfully enable users to establish their identity online, in a manner that is both fluid and resilient. These systems have to perform 99.9% without a hitch, block cyber threats and be foolproof. The stakes are high—81% of data breaches are attributed to compromised credentials.

Security is as much about user experience as it is about safety. If authentication takes longer than 30 seconds, 65% of users will simply abandon their transactions. Having spent years building authentication risk assessment systems, I’d like to use that experience to communicate some key insights I’ve gained about securing identities at scale, while also measuring attack in a way that meets your security objectives, and minimizing friction for legitimate users.

This article has been indexed from DZone Security Zone

Read the original article: