Access Management Verifies Enterprise Mobility Management Status of Mobile Device
A user’s mobile device can be managed by EMM and with this management is the ability to determine whether or not that device is in a compromised status. Access Management will utilize the status to make a determination on whether or not to allow access to its portal.
Access Management utilizes Enterprise Mobility Management (EMM) managed device’s status to seamlessly authenticate a user.
– Click for larger image –
- End user is able to log into the Access Management portal via their un-compromised mobile device.
IDSA Security Controls
Authentication based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).