Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.
Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.
To qualify for inclusion in the risk-based authentication category, a product must:
Risk-based Authentication reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.
Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.
SecureAuth, the secure identity company, is leveraged by leading organizations to secure all workforce and customer identities everywhere: cloud, hybrid and on premises. As a leader in identity and access management, the company enables secure access to systems, applications and data for organizations and their customers. SecureAuth provides the most flexible and adaptable identity and access management solution to exponentially reduce the threat surface, enable user adoption and meet business demands with frictionless user experience driving engagement and productivity.
Fraud prevention is just the beginning. Grow your business using Kount’s award-winning combination of advanced machine learning, flexible rules engine, and self-service analytics while protecting against financially malicious activity. Kount’s unique approach and patented technology creates a multitude of benefits for our clients; including reduced chargebacks, reduced or eliminated manually reviewed orders, reduced mobile fraud and increased sales. Kount also partners with the world’s largest acquiring banks, payment gateways, e-commerce and technology platforms, and other organizations to provide their merchants with payments fraud prevention, new accounts fraud prevention, and account takeover protection.
Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.
Clearlogin Single Sign-On & Cloud Identity App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features.
Every day the threats from cybercrime are evolving, meaning the traditional one-size-fits-all approach to cyber security risk management either results in too much or too little security. Forget the stress and risk of outdated password-based logins. Callsign makes it easy with a secure authentication solution that works the way you and your users want. Protect your Enterprise with seamless authentication, anywhere, anytime. It’s smooth sailing for you and your users because behind the scenes we run a highly configurable Intelligence Driven Authentication platform, that uses multiple layers to recognize users through deep learning based upon location, behavior, device and biometrics. Unlike anything else, Callsign is an innovative and agile solution that future-proofs authentication and puts you back in control.
CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud.
Our on-premise authentication solution gives you the flexibility to secure access across your enterprise without compromising the user experience. With a wide range of capabilities, assurance levels, deployment options and mobile innovations, you can easily provision authentication methods tailored to your security needs. A single point of administration lets you manage identities for all users across your entire enterprise, including cloud and legacy applications, VPN access, desktop login and customer and partner portals. And when you’re ready to move to a cloud-based authentication solution, we can protect your investment by transitioning you to our IntelliTrust™ Authentication Service.
IntelliTrust Authentication Service — an analyst top-rated solution — enables secure access that’s simple to deploy, easy to manage and effortless to use. Behind-the-scenes authentication empowers IntelliTrust users to log in to workstations and applications, and open secure doors with just a tap of their phones. Quickly and easily provision authentication to new applications and streamline identity management across your hybrid enterprise environment from one platform. Incorporate a zero-trust architecture with our industry-proven, time-tested intelligent identity solution.
At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a robust and flexible policy engine. These capabilities help to power the Platform for delivering a scalable set of applications that help customers prevent threats and support broad set of use cases. The applications include:
LexisNexis Small Business Risk Score leverages our vast repository of consumer and business public records content and applies advanced analytics to create a non-traditional business credit check that includes a blended risk scoring solution to assess businesses that don't have an established line of credit.
The Next Generation Platform for Identity and Authentication Hate passwords? So do we. We believe that within five years, passwords will no longer be the predominant method of authentication. We are UnifyID, a company that is building a revolutionary identity platform based on implicit authentication. Our solution allows people to identify themselves in a unique way that is extremely difficult to forge or crack. Best of all, we are doing it in a way that respects user privacy. We are developing a revolutionary new technique for authentication that relies on implicit authentication. These are factors that are unique to you but don’t require any user action, such as your location, your habits, and various signals from the devices you carry and the sensors around you. We use proprietary machine learning algorithms to discover what makes you unique and calculate a confidence level of how likely it is you based on these signals.