Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Preempt Platform

At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a robust and flexible policy engine. These capabilities help to power the Platform for delivering a scalable set of applications that help customers prevent threats and support broad set of use cases. The applications include:

Work for Preempt Platform?

Learning about Preempt Platform?

We can help you find the solution that fits you best.

Preempt Platform Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Showing 0 Preempt Platform reviews
LinkedIn Connections

What Risk-based Authentication solution do you use?

Thanks for letting us know!

There are not enough reviews of Preempt Platform for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Adaptive Multi-Factor Authentication Logo
Okta Adaptive Multi-Factor Authentication
4.4
(14)
Okta's Adaptive Multi-Factor Authentication is designed to be a security solution for all applications.
2
SecureAuth Logo
SecureAuth
4.4
(13)
2 Factor and SSO solution
3
RSA SecurID Risk-Based Authentication Logo
RSA SecurID Risk-Based Authentication
4.3
(6)
RSA SecurID Risk-Based Authentication is designed to enhance the traditional username and password log-in experience with a risk scoring engine that validates the legitimacy of user access requests.
4
Apache Sentry Logo
Apache Sentry
3.9
(4)
Apache Sentry is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster.
5
RSA Adaptive Authentication Logo
RSA Adaptive Authentication
4.8
(4)
RSA Adaptive Authentication is a complete fraud detection platform that leverages risk-based, multifactor authentication to protect users accessing websites, online portals, mobile browsers and mobile apps.
6
ThreatMetrix Logo
ThreatMetrix
4.3
(2)
ThreatMetrix is a digital identity company that provides cloud solutions for authenticating digital personas and transactions on the internet.
7
IBM Security Risk Based Authentication Logo
IBM Security Risk Based Authentication
4.0
(1)
IBM Security Risk Based Authentication Solution provides transparent evidence-based fraud protection coupled with user access management.
8
TypindDNA Logo
TypindDNA
(0)
Typing biometrics is a keystroke dynamics verification technology suitable for SaaS, web apps, eLearning(LMS), ePayments and devices.
9
Zighra Logo
Zighra
(0)
Zighra is a mobile security company that provifes patented continuous authentication and behavioral fraud detection powered by artificial intelligence.
10
Acceptto Cognitive Authentication Logo
Acceptto Cognitive Authentication
(0)
Acceptto is a cybersecurity company providing identity protection and Cognitive Continuous Authentication, threat modeling and analytics in a SaaS-based operating model.
Show more
Kate from G2

Learning about Preempt Platform?

I can help.
* We monitor all Preempt Platform reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.