{"id":6897,"date":"2023-04-12T08:59:29","date_gmt":"2023-04-12T06:59:29","guid":{"rendered":"https:\/\/heliview.com\/ntity-access-management\/?p=6897"},"modified":"2023-04-12T09:00:01","modified_gmt":"2023-04-12T07:00:01","slug":"risk-based-authentication","status":"publish","type":"post","link":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/","title":{"rendered":"Risk-Based Authentication"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Secure access used to be simpler. Everyone logged into the same corporate network, on a managed device, with firewalls to protect internal resources from outsiders. But we live in a hybrid-work world now, with more people working from home, in coffee shops, and while traveling. Each new login attempt from each place and device must be evaluated for risk. Additionally, there needs to be a new model that no longer relied on the corporate network to establish trust and verify access. Zero Trust provides a framework for rethinking trust at each access decision, as employees seek to work from anywhere, on any device. As Cisco Advisory CISO Wendy Nather summarized Zero Trust, \u201cTrust is neither binary, nor permanent.\u201d In other words, no access attempt is either trusted or not; instead, it is measured on a relative scale to determine if that attempt is in a \u201chigh\u201d or \u201clow\u201d trusted situation. It also accounts for change. If an attempt once received \u201chigh\u201d trust, it does not automatically qualify for \u201chigh\u201d trust later, as trust is constantly being evaluated.<\/p>\n[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download the whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    E\u00e9n of meerdere velden zijn niet of incorrect ingevuld.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Voornaam*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Achternaam*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Bedrijfsnaam*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Functie*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Zakelijk E-mailadres*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>Door op aanmelden te klikken geeft u toestemming om gemaild te worden, u ontvangt de whitepaper in uw mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '5b504bb1-b679-40b6-899c-d49a048ce9a8')\" type=\"button\" class=\"lgx-btn\" value=\"Aanmelden\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Bedankt, je ontvangt binnen een paar minuten een e-mail om de whitepaper te downloaden.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Er is helaas iets mis gegaan; uw aanvraag is niet gelukt. Probeer het later nog eens.<\/div>\n            <\/form>\n        <\/div>[vc_empty_space][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts title=&#8221;Ander nieuws&#8221; number=&#8221;3&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Secure access used to be simpler. Everyone logged into the same corporate network, on a managed device, with firewalls to protect internal resources from outsiders. But we live in a hybrid-work world now, with more people working from home, in coffee shops, and while traveling. Each new login attempt from each place and device must [...]","protected":false},"author":7,"featured_media":7205,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-6897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Risk-Based Authentication - Identity &amp; Access Management<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Risk-Based Authentication - Identity &amp; Access Management\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Identity &amp; Access Management\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2023-04-12T06:59:29+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2023-04-12T07:00:01+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"siham\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"siham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/\",\"url\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/\",\"name\":\"Risk-Based Authentication - Identity &amp; Access Management\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png\",\"datePublished\":\"2023-04-12T06:59:29+00:00\",\"dateModified\":\"2023-04-12T07:00:01+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png\",\"contentUrl\":\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/identity-access-management\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk-Based Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#website\",\"url\":\"https:\/\/heliview.com\/identity-access-management\/\",\"name\":\"Identity &amp; Access Management\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/identity-access-management\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\",\"name\":\"siham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"caption\":\"siham\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risk-Based Authentication - Identity &amp; Access Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/","og_locale":"nl_NL","og_type":"article","og_title":"Risk-Based Authentication - Identity &amp; Access Management","og_url":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/","og_site_name":"Identity &amp; Access Management","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2023-04-12T06:59:29+00:00","article_modified_time":"2023-04-12T07:00:01+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png","type":"image\/png"}],"author":"siham","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Geschreven door":"siham","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/","url":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/","name":"Risk-Based Authentication - Identity &amp; Access Management","isPartOf":{"@id":"https:\/\/heliview.com\/identity-access-management\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png","datePublished":"2023-04-12T06:59:29+00:00","dateModified":"2023-04-12T07:00:01+00:00","author":{"@id":"https:\/\/heliview.com\/identity-access-management\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0"},"breadcrumb":{"@id":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#primaryimage","url":"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png","contentUrl":"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/04\/Whitepaper-cisco.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/identity-access-management\/risk-based-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/identity-access-management\/"},{"@type":"ListItem","position":2,"name":"Risk-Based Authentication"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/identity-access-management\/#website","url":"https:\/\/heliview.com\/identity-access-management\/","name":"Identity &amp; Access Management","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/identity-access-management\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/heliview.com\/identity-access-management\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0","name":"siham","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/identity-access-management\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","caption":"siham"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/posts\/6897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/comments?post=6897"}],"version-history":[{"count":2,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/posts\/6897\/revisions"}],"predecessor-version":[{"id":7206,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/posts\/6897\/revisions\/7206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/media\/7205"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/media?parent=6897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/categories?post=6897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/tags?post=6897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}