Essential Guide

Managing information security amid new threats: A guide for CIOs

A comprehensive collection of articles, videos and more, hand-picked by our editors

context-aware security

Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions.

Context-aware security is the use of situational information (such as identity, geolocation, time of day or type of endpoint device) to improve information security decisions.

Context-aware security requires knowledge of who the user is, what the user is requesting, how the user is connected, when the user is requesting information and where the user is located. The goal is to prevent unauthorized end users or insecure computing devices from being able to access corporate data. Such an approach might allow an end user to browse the network from inside the office, for example, but deny access if the end user is trying to connect with public Wi-Fi.

One analogy that is often used to explain context-aware security is a door with a lock. A standard security door would simply require a key to open the door's lock. By comparison, a context-aware security door would behave differently in different scenarios. For example, a man in the United States might require a key to open the door, while a man in the United Kingdom would only need to know a secret password.

Context-aware security has become more important in the past few years because of the risks associated with IT consumerization and cloud computing

See also: context-aware network access control

 

This was first published in October 2013

Continue Reading About context-aware security

Glossary

'context-aware security' is part of the:

View All Definitions

PRO+

Content

Find more PRO+ content and other member only offers, here.

Essential Guide

Managing information security amid new threats: A guide for CIOs

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchEnterpriseDesktop

SearchVirtualDesktop

  • VDI assessment guide

    Wait! Don't implement VDI technology until you know your goals and needs. A VDI assessment should consider the benefits of a VDI ...

  • Guide to calculating ROI from VDI

    Calculating ROI from VDI requires a solid VDI cost analysis. Consider ROI calculation models, storage costs and more to determine...

  • Keep the cost of VDI storage under control

    Layering, persona management tools and flash arrays help keep virtual desktop users happy and VDI storage costs down.

SearchVMware

SearchCIO

SearchSecurity

Close