Jason Oeltjen

Product Management Consultant

Jason is a Product Management Consultant and lead for the RSA identity portfolio. He has spent the last 5 years focused on creating identity solutions that bridge consumer level usability with enterprise requirements. He has a deep history of creating and deploying enterprise solutions while working in product management and engineering leadership roles for start-up and large technology providers and in IT departments of Fortune 500 companies. https://www.linkedin.com/in/jasonoeltjen

Authentication and Anomaly Detection: 3 Ways to Identify When an Access Request Isn’t What It Seems

Authentication and IT Ecosystem: Leveraging Data from Multiple Sources

Authentication and IT Ecosystem: Leveraging Data from Multiple Sources

Your immediate IT ecosystem is just one part of the broader IT ecosystem – and therefore just one source of information that can be used to authenticate identities and grant access to systems. From your threat detection system to...

Authentication and Business Context: Answering the “Who? What? And Where?

Authentication and Business Context: Answering the “Who? What? And Where?

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. But today there’s a whole lot more at stake, so enterprises need more to effectively...

Authentication and Machine Learning: Taking Behavior Recognition to a New Level

Authentication and Machine Learning: Taking Behavior Recognition to a New Level

Behavior recognition is a powerful tool, helping to establish that people who request access to business applications or services are in fact who they say they are. When someone attempts to sign in from a familiar device in a...

Authentication and Consistent Experience: Making It Seamless Across Apps and Devices

Authentication and Consistent Experience: Making It Seamless Across Apps and Devices

As much as you’d like to deliver secure access with minimum inconvenience to users, there will always be times when they have to take an extra step to prove they’re who they claim to be. But when step-up authentication is...

Flexible Authentication: You’ve Got Some Choices to Make

Flexible Authentication: You’ve Got Some Choices to Make

The great thing about having an authentication solution that offers many different ways to authenticate is that you can pick and choose which ones you want to offer users—and which you don’t. The following information will help...

Load More