Best Risk-based Authentication Software

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the risk-based authentication category, a product must:

  • Assess a user’s unique network, device, and behavior to determine risk
  • Prompt authentication measures after assessment
  • Utilize authentication methods such as SMS, questioning, or email confirmation
  • Periodically store and update suspicious networks, devices, and behaviors
G2 Grid® for Risk-based Authentication
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
Star Rating

Risk-based Authentication reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Risk-based Authentication Software

G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 42
Filter Results
Filter by:
Sort by
Star Rating
Sort By:
Results: 42

    Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.

    Fraud prevention is just the beginning. Grow your business using Kount’s award-winning combination of advanced machine learning, flexible rules engine, and self-service analytics while protecting against financially malicious activity. Kount’s unique approach and patented technology creates a multitude of benefits for our clients; including reduced chargebacks, reduced or eliminated manually reviewed orders, reduced mobile fraud and increased sales. Kount also partners with the world’s largest

    Okta's Adaptive Multi-Factor Authentication is designed to be a security solution for all applications.

    Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services incl

    RSA Adaptive Authentication is a complete fraud detection platform that leverages risk-based, multifactor authentication to protect users accessing websites, online portals, mobile browsers and mobile apps.

    SecureAuth, the secure identity company, is leveraged by leading organizations to secure all workforce and customer identities everywhere: cloud, hybrid and on premises. As a leader in identity and access management, the company enables secure access to systems, applications and data for organizations and their customers. SecureAuth provides the most flexible and adaptable identity and access management solution to exponentially reduce the threat surface, enable user adoption and meet business d

    Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.

    RSA SecurID Risk-Based Authentication is designed to enhance the traditional username and password log-in experience with a risk scoring engine that validates the legitimacy of user access requests.

    Symantec™ VIP is a leading user-friendly, cloud-based, strong authentication service that provides secure access to sensitive data and applications anytime, anywhere, from any device.

    Apache Sentry is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster.

    ThreatMetrix is a digital identity company that provides cloud solutions for authenticating digital personas and transactions on the internet.

    Clearlogin Single Sign-On & Cloud Identity App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authen

    IBM Security Risk Based Authentication Solution provides transparent evidence-based fraud protection coupled with user access management.

    Acceptto is a transformative cybersecurity company delivering continuous identity access protection and real-time threat analytics with Biobehavioral(TM) AIML-powered authentication technology in an age where your identity is persistently attacked.

    Authenticate: Desktop is an identity management software that checks identity and age.

    BehavioSec provides a layer of security that lets your customers authenticate themselves through the unique ways they type, swipe and hold their devices.

    BioCatch offers behavioral authentication and malware detection for web and mobile applications.

    CA Advanced Authentication is designed to provide a secure, user-convenient and cost-effective way to protect mobile and web applications.

    Every day the threats from cybercrime are evolving, meaning the traditional one-size-fits-all approach to cyber security risk management either results in too much or too little security. Forget the stress and risk of outdated password-based logins. Callsign makes it easy with a secure authentication solution that works the way you and your users want. Protect your Enterprise with seamless authentication, anywhere, anytime. It’s smooth sailing for you and your users because behind the scenes we

    CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score

    Frictionless Authentication for Digital Channels. It's a mobile-driven world now, and authentication must innovate to keep up with customer demands for convenience without compromising on security.

    Insider Threat Protect intellectual property and detect insider threats to data and critical systems with user analytics, behavior profiling and rich context to user actions.

    User & Entity Behavior Analytics: AI-fueled behavior analytics to identify real entity risk

    HYPR provides decentralized biometric security for the Internet of Things.

    Our on-premise authentication solution gives you the flexibility to secure access across your enterprise without compromising the user experience. With a wide range of capabilities, assurance levels, deployment options and mobile innovations, you can easily provision authentication methods tailored to your security needs. A single point of administration lets you manage identities for all users across your entire enterprise, including cloud and legacy applications, VPN access, desktop login and

    Latest Risk-based Authentication Articles