New AuthPoint Geokinetics Policy in WatchGuard Cloud
As part of AuthPoint’s Zero-Trust Framework, a new policy is now available in WatchGuard Cloud. The goal of the Geokinetics policy is to prevent unexpected authentications from attackers that are distant from the authorized user. For example, if the user is in the U.S., and an attacker from a different geographic location tries to authenticate with the user’s credentials, this policy can block the attackers request, even if the user is subject to phishing or social engineering and is convinced by the attacker to approve a push notification or a one-time password (OTP).
Empowering Your MFA Selling Strategy with AuthPoint’s Zero-Trust Framework
Take advantage of advanced features like risk policies to ace more multi-factor authentication (MFA) deals. Risk policies enable you to manage authentication requirements based on your customers’ security needs. Choose to strengthen or streamline the authentication experience according to the level of risk and type of user.
How is this policy different from other policies? The geokinetics policy compares the user’s device location on consecutive authentications and checks the distance and time between them. It can automatically block an authentication that does not match the configured parameters set by the operator.
Currently, the following AuthPoint policy objects are available in WatchGuard Cloud:
- IP Location
- Geolocation
- Time Schedule
- Geokinetics
Remember that the combination of the existing policies provides more flexibility and more powerful configurations, tailored to your end users’ needs.