Jan 20, 2020

When Rules Aren’t Enough: Leveraging an AI-Driven Risk Engine for Your Authentication Strategy

Watch the Recorded Webinar:


Most security products utilize strict rule-based policies. However, the dynamic nature of our environments, and the constantly changing security landscape, require us to implement an adaptive approach. Adaptive security responses should be based on risk and remove continuously adapt to the context of each interaction. An adaptive approach is much more effective than binary-style allow/deny rules that are either too lax and allow threats through, or too stringent to the point they block legitimate access and cause disruptions.

Watch this webinar to learn how Silverfort’s AI-Driven Risk Engine operates and how you can leverage it to protect your sensitive assets across enterprise networks and cloud environments.

This recorded webinar is discussing the following:

  • The importance of continuous risk and trust analysis
  • The use of AI and machine learning in threat detection
  • Implementation of adaptive policies


Rotem Zach, VP Research

Rotem leads Silverfort’s research team, which tackles some of the most complex challenges in cybersecurity, authentication and big data analytics. He joined Silverfort after many years of research and leadership roles at the 8200 elite cyber unit of the Israel Defense Forces. Rotem holds a B.Sc. in Mathematics and Computer Science, Summa Cum Laude, and an M.Sc. in Computer Science from Tel Aviv University.

Ron Rasin, VP Product Management

Ron leads Silverfort’s product management and roadmap. He brings over a decade of hands-on product management experience and cyber security expertise. Prior to joining Silverfort, Ron was the Director of Product Management at Claroty, and held product management roles at Wix and NCR. Before that Ron served as a Team Leader at the 8200 elite cyber unit of the Israel Defense Forces. Ron holds a B.A in Economics from Tel Aviv University.

Request a Demo

Sign up for a demo to see how Silverfort can instantly detect and prevent unauthorized access to your critical assets and sensitive business data

Request a Demo