Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

IBM Security Risk Based Authentication

4.0
(1)

IBM Security Risk Based Authentication Solution provides transparent evidence-based fraud protection coupled with user access management.

Work for IBM Security Risk Based Authentication?

Learning about IBM Security Risk Based Authentication?

We can help you find the solution that fits you best.

IBM Security Risk Based Authentication Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 IBM Security Risk Based Authentication review
LinkedIn Connections
IBM Security Risk Based Authentication review by Ramon M.
Ramon M.
Validated Reviewer
Review Source
content

"A product that has the intelligence to protect cybersecurity and protection of the organization."

What do you like best?

One of the most relevant aspects regarding the use of the product is that it allows an analysis and protection in real time which undoubtedly allows taking necessary actions when detecting a threat, especially its use has been applied during transactions as well as access database that has confidential degree information related to the financial statements as well as information from members of the organization, which can not be compromised by the company's own rights, which its interface and tools allow an efficient high intelligent analysis efficiency, which establishes a constant monitereo that guarantee their main functionalities.

What do you dislike?

As for the product it is very complete, integrated and very simple interface with respect to the functions, until now it has provided good results in the process of the company's safety management, which provides the highest efficiency in the services of the company. product, therefore my person and the organization have not found any problem also has a good technical support that guarantees the quality and functions of the product.

Recommendations to others considering the product

This software offers a very good alternative and efficient with respect to risk security, which undoubtedly improves efficiency and is an innovative tool that increases the utility and operational efficiency in the risk management of the company.

What business problems are you solving with the product? What benefits have you realized?

This product has been allowed to be a very useful tool in risk management, which has placed all the confidence in the use of the product for quality and guarantee, and also is a very innovative and updated tool that is on par with and in a high category with respect to protection, especially in the case of fraudulent transactions and access, theft of information and others that may affect the integrity and other functions of the organization.

Sign in to G2 to see what your connections have to say about IBM Security Risk Based Authentication

What Risk-based Authentication solution do you use?

Thanks for letting us know!

There are not enough reviews of IBM Security Risk Based Authentication for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Adaptive Multi-Factor Authentication Logo
Okta Adaptive Multi-Factor Authentication
4.4
(14)
Okta's Adaptive Multi-Factor Authentication is designed to be a security solution for all applications.
2
SecureAuth Logo
SecureAuth
4.4
(13)
2 Factor and SSO solution
3
RSA SecurID Risk-Based Authentication Logo
RSA SecurID Risk-Based Authentication
4.3
(6)
RSA SecurID Risk-Based Authentication is designed to enhance the traditional username and password log-in experience with a risk scoring engine that validates the legitimacy of user access requests.
4
Apache Sentry Logo
Apache Sentry
3.9
(4)
Apache Sentry is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster.
5
RSA Adaptive Authentication Logo
RSA Adaptive Authentication
4.8
(4)
RSA Adaptive Authentication is a complete fraud detection platform that leverages risk-based, multifactor authentication to protect users accessing websites, online portals, mobile browsers and mobile apps.
6
ThreatMetrix Logo
ThreatMetrix
4.3
(2)
ThreatMetrix is a digital identity company that provides cloud solutions for authenticating digital personas and transactions on the internet.
7
Pindrop Security Logo
Pindrop Security
(0)
Pindrop solutions identify fraudsters based on anomalies in their calls, allowing us to detect spoofing, forwarding, suspicious call origins, and other indications of fraud.
8
Zighra Logo
Zighra
(0)
Zighra is a mobile security company that provifes patented continuous authentication and behavioral fraud detection powered by artificial intelligence.
9
Acceptto Cognitive Authentication Logo
Acceptto Cognitive Authentication
(0)
Acceptto is a cybersecurity company providing identity protection and Cognitive Continuous Authentication, threat modeling and analytics in a SaaS-based operating model.
10
BioCatch Logo
BioCatch
(0)
BioCatch offers behavioral authentication and malware detection for web and mobile applications.
Show more
Kate from G2

Learning about IBM Security Risk Based Authentication?

I can help.
* We monitor all IBM Security Risk Based Authentication reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.