"zero-touch" authentication: consumer trends that will transform the enterprise
DESCRIPTION
Banks and Retailers have learned important lessons over the years about consumer tolerance for strong authentication. User convenience and expectation drive authentication choices. Ram describes the CA vision for “zero-touch” authentication that leverages analytics and the ubiquity of mobile devices to deliver a more pleasant and comfortable experience for customers and show how this technology can be extended to the enterprise. For more information on CA Security solutions, please visit: http://bit.ly/10WHYDmTRANSCRIPT
ca Securecenter
“Zero-Touch” Authentication: Consumer Trends That will Transform the EnterpriseRam Varadarajan
SCT02S #CAWorld
CA TechnologiesGeneral Manager, Mobility and eCommerce
2 © 2014 CA. ALL RIGHTS RESERVED.
Abstract
Ram Varadarajan
CA Technologies
General Manager
Mobility & eCommerce
Banks and Retailers have learned important lessons over
the years about consumer tolerance for strong
authentication. User convenience and expectation drive
authentication choices. Ram will describe CA’s vision for
“zero-touch” authentication that leverages analytics and
the ubiquity of mobile devices to deliver a more pleasant
and comfortable experience for customers and show how
this technology can be extended to the enterprise.
3 © 2014 CA. ALL RIGHTS RESERVED.
Agenda – “Zero-Touch” Authentication
BALANCING SECURITY AND CONVENIENCE
BRINGING CONSUMER AUTHENTICATION TO THE ENTERPRISE
LESSONS LEARNED FROM CONSUMER AUTHENTICATION
LEVERAGING ANALYTICS AND THE UBIQUITY OF MOBILE
4 © 2014 CA. ALL RIGHTS RESERVED.
Innovation is Key to Success
5 © 2014 CA. ALL RIGHTS RESERVED.
Business Advantage of “Zero-Touch” AuthenticationLarge Global Bank
Dep
loym
ent
7 Weeks
Tran
sact
ion
Val
ue
1.8x Growth
Tran
sact
ion
Fre
qu
ency
2x as often
6 M
on
th S
avin
gs
$2.2 Million
6 © 2014 CA. ALL RIGHTS RESERVED.
Evolution of Consumer Authentication
Building Trust
Fighting Fraud
Minimizing Friction
PersonalizingExperience
GOAL
Simple, Static Password
Complex Password, Basic Rules
Basic Analytics, Dynamic Passwords, SMS, Tokens
Advanced BehavioralModels, 2FA only when needed
ACTION
Easily StolenOr Guessed
Forgot Password, Rules One Size Fits All, Unhappy Customers
Stopped Too Many Genuine Users, Lost revenue
Identify Legitimate Users, Provide Personalized Experience
OUTCOME
Late 90s
2005
2010
2015
7 © 2014 CA. ALL RIGHTS RESERVED.
CONSUMERS REVOLTED!
CONSUMER FOCUSED BUSINESSES GOT THE MESSAGE
ENTERPRISE USERS ARE STILL WAITING…
8 © 2014 CA. ALL RIGHTS RESERVED.
Consumerization of IT has Arrived!
Mobile devices proliferate in the enterprise
Delightful user experience is key
Big Data Analytics drive personalization
Biometrics and wearablesgaining ground
1
2
3
4
9 © 2014 CA. ALL RIGHTS RESERVED.
Balancing Security and Convenience
10 © 2014 CA. ALL RIGHTS RESERVED.
The Tough Problem: Managing Business and User Focus
User FocusInternal
Requirements
11 © 2014 CA. ALL RIGHTS RESERVED.
CA Has Solved the Tough Problem with its Technology
User FocusInternal
Requirements
Revenue Growth
Operational Costs and Control
Fraud Prevention
User
Acceptance
• Patented technology building blocks deliver balance.
• Patents in mobility, analytics, security, and key protection.
12 © 2014 CA. ALL RIGHTS RESERVED.
39%
Leveraging analytics and the ubiquity of mobile
13 © 2014 CA. ALL RIGHTS RESERVED.
Ingredients of “Zero-Touch” Authentication
AnalyticsMachine LearningNeural NetworksReal-time Risk ScoringAuto base-liningAnomaly DetectionBehavioral Profiling…
MobilityDynamic PasswordsInteractive AuthenticationEndpoint securitySmart ContainerizationApp Wrapping…
14 © 2014 CA. ALL RIGHTS RESERVED.
CA Solutions that Leverage “Zero-Touch”
• CA Risk Analytics• CA Transaction Manager• CA Strong Authentication• CA Mobile Device Management• CA Mobile Application Management• CA Mobile Content Management• CA Mobile Email Management
15 © 2014 CA. ALL RIGHTS RESERVED.
“Zero-Touch” Can Transform the Enterprise
eCOMMERCE THREAT DETECTION UNIVERSAL ACCESSTAP AND PAY BIOMETRICS,MOBILE, WEARABLES
MOBILE FOR BUILDING ACCESS
PROXIMITY AUTHENTICATION VIA MOBILE
16 © 2014 CA. ALL RIGHTS RESERVED.
Call to Action
ZERO-TOUCH AUTHENTICATION
IDEAL COMBINATIONOF DELIGHTFUL
CUSTOMER EXPERIENCE AND HIGH SECURITY
Evaluate current authentication touch points
Assess mobile usage across application portfolios
Leverage all data for analytics
Identify top applications which would benefit from “ZERO-TOUCH”
Develop key metrics for user experience and business value
17 © 2014 CA. ALL RIGHTS RESERVED.
CA IS SETTING THE PACE
HISTORY OF INNOVATION FROM MAINFRAME TO MOBILE
TECHNOLOGY LEADERSHIP
PROVEN SUCCESS
General Manager, Mobility and [email protected]
Ram Varadarajan
Ram Varadarajan
slideshare.net/CAinc
linkedin.com/company/ca-technologies
19 © 2014 CA. ALL RIGHTS RESERVED.
For More Information
To learn more about Security,
please visit:
http://bit.ly/10WHYDm
Insert appropriate screenshot and text overlayfrom following “More Info Graphics” slide here;
ensure it links to correct pageSecurity
20 © 2014 CA. ALL RIGHTS RESERVED.
For Informational Purposes Only
© 2014 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Terms of this Presentation