Continuous Contextual Authentication: Cybersecurity and Identity Converge in a Hybrid-cloud World

  1. Identity and cybersecurity have historically been isolated ecosystems
  2. Moving from perimeter based to transactional based authorization

Digital Innovation Through Continuous Context

Step 1: Integrate cybersecurity signals directly into authorization and authentication decisions.

Gartner Research: “Defining Cloud Web Application and API Protection Services” — Jeremy D’Hoinne, Adam Hills, Feb. 26, 2019. Emphasis added

Step 2: Moving to the service edge

How it works



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store