Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
-
Upload
forgerock -
Category
Technology
-
view
929 -
download
2
Transcript of Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
TAKEOVER OF SOCIAL LOGIN
50%USE
social login
90%SEEN
social login 2 BILLIONUSE
social login
75%WORLDinternet users
SOCIAL MEDIA CYBER ATTACKS
36%SOCIAL NETWORK USERS
HAVE ACCEPTED FRIEND
REQUESTS FROM
PEOPLE THEY DO NOT
KNOW
1/6SOCIAL NETWORK USERS
REPORT THAT SOMEONE
HAS HACKED INTO THEIR
PROFILE AND
PRETENDED TO BE THEM
4/10SOCIAL NETWORK USERS
HAVE FALLEN VICTIM TO
CYBERCRIME ON SOCIAL
NETWORK PLATFORMS
SOCIAL MEDIA CYBER ATTACKS
Impersonations• Fake accounts use a organization’s logo to spread
malware and phishing to customers
Executive Impersonators• Executive impersonator gains followers over the course
of months, announces company is going belly up
SOCIAL MEDIA CYBER ATTACKS
Customer Service Scams• Fake customer service accounts target customers or
other customer service reps
Sensitive Information• Sensitive or noncompliant information, true or false, sent
to stakeholders
THE CHALLENGE
IRS• Name• Social Security Number or
Individual Tax ID Number (ITIN)• Date of Birth• Filing Status• Mailing Address• Third Party Verification
Questions
WHAT YOU GET
CONTEXT BREEDS CONFIDENCE
Driven by expert models, supervised machine learning and malware and phishing detection technology, the Security Analysis Engine identifies never before seen attacks and
camouflaged threats.
ZEROFOX CONTINUOUS IDENTITY PROTECTION
HIGHLIGHTS• Real-time security analysis of users
as they attempt to log in to an application.
• Assess each identity for behavioral and technical threat indicators to identify elevated risk levels.
• Find malicious or fraudulent behavioral indicators in a user’s network.
FORGEROCK INTEGRATION
ZeroFOX conducts real-time security analysis of each user as they attempt to log in, empowering ForgeRock to:• Monitor and enhance
controls around high risk users
• Shut out compromised accounts
• Identify malicious actors• Have a comprehensive
risk profile of each user