How Contextual Authentication Helps Establish User IdentityPidilite Industries' Tiwari Speaks on Remote Authentication
It is ideal to have contextual authentication as it balances trust against risks in an organization, says Avinash Tiwari, CISO and head, information security at Pidilite Industries, a large manufacturing firm. (See: Using Passwordless Authentication for Identity Management)
See Also: Move Beyond Passwords
Context-based authentication balances trust against risk by letting an organization implement simple policies that allow or deny access to web applications based on contextual information - such as user role, device usage, IP address and geographical location.
"My R&D system is my crown jewel. I am not giving easy access to this (database). I am ready to take some friction for my crown jewel. But somebody wants to have access to my leave attendance data, I will not add much security friction to that," says Tiwari.
In this video interview with Information Security Media Group, Tiwari also discusses:
- Steps to follow to safeguard critical data;
- How to remotely authenticate new employees;
- MFAs suitable for manufacturing industries.
Tiwari is CISO and head, information security at Pidilite Industries, a large manufacturing firm. He is responsible for identifying, evaluating and reporting on legal and regulatory, IT, and cyber security risk to information assets, while supporting and advancing business objectives.