Current authentication methods are no longer sufficient. Most of today's security infrastructure is static, enforcing policies defined in advance in environments where IT infrastructure and business relationships are relatively static. This is no longer sufficient in an environment that is highly dynamic, multi-sourced, and virtualized, and where the cloud is increasingly used in lieu of enterprise-owned and provisioned systems. Understanding the context that a user is operating in and the resources they are accessing allows for an understanding of their risk and gives the ability to make authentication choices based on this risk. In this session, Jackson Shaw will discuss why Dell chose to partner with Authy and what methodologies they are going to use to protect enterprise and cloud-based applications and resources.