How machine learning powers advanced adaptive authentication

Machine Learning
Back to Blog
January 22, 2019
Damon Tepe

Enterprises spent nearly $100B globally last year on cybersecurity[1], but breaches increased a record 44%[2]. Unfortunately, this tells us that the money being spent on security – including password protection and two-factor authentication (2FA) – are not preventing identity-related incidents.

In order to thwart, and even prevent, these attacks, we have to unmask attackers who impersonate legitimate users, and this requires a great deal of intelligence. So, how do you shift from traditional methods of access control to the future of cybersecurity? By combining machine learning with multi-factor authentication (MFA) in a way that learns and adapts to prevent breaches.

Machine learning enhances protection against attackers
Machine learning helps organizations identify high-risk users and treat them differently than other, more trustworthy identities. This is a critical solution for organizations in the face of increasingly sophisticated threats, because it analyzes authentication data over time to find anomalies or inconsistencies that can signal attacker behavior. Machine learning baselines “normal” behavior for all users over time and then identifies inconsistent patterns that could indicate a compromise. This additional layer of intelligence helps security professionals and access management systems make more informed decisions around who should and should not gain access.

The power of SecureAuth IdP adaptive authentication
Machine learning and identifying abnormal behavior is one of many layers in our comprehensive breach prevention and access protection solution, SecureAuth IdP. Security in layers has proven an effective approach to better protection. The more context and data an organization can gather about an access requestor, the better the chance to determine if they pose a threat or not. This starts with multi-factor authentication, but doesn’t end there: SecureAuth IdP provides the most comprehensive set of risk analysis in the industry, analyzing behavior through machine learning, along with numerous device, location, IP address, and account type risk checks. All of these risk checks are part of our adaptive authentication solution that enables our customers to cast as many traps as possible to catch attackers.

If you do not look, you will not find
Adaptive authentication offers many layers of security and it also provides a disruption-less user experience — the best of both worlds. The more you know about a user, the more confidence and trust you gain that the user is or is not who they claim to be. For those with high trust, a second factor or multi-factor step is not needed. This means users are only disrupted when risk is present.

Machine learning is a powerful component of a risk-based authentication program. With SecureAuth IdP you’ll be able to:

  1. Uncover threats through behavioral analysis to detect abnormalities such as:
    • Time/day of the week of login activity
    • New or rarely used IP address
    • New or rarely visited location
    • Change in login success frequency
    • Change in login failure frequency
    • Increase in application login activity
  2. Provide an elevated level of protection against attackers, including those with valid credentials that bypass traditional 2FA.
  3. Shrink detection time by identifying anomalous activity and potential risks and passing this intelligence to security operation teams.
  4. Detect potential insider threats – one the most difficult threats to uncover.

Read more about SecureAuth adaptive authentication or request a demo here.


[1] Gartner – https://www.gartner.com/newsroom/id/3836563

[2] Identity Theft Resource Center – https://www.idtheftcenter.org/2017-data-breaches/

Never Miss a Beat
Subscribe to Our Blog

SecureAuth Identity Platform Adaptative Authentication

Identity and Access Management

Empower your digital initiatives with secure access for everyone and everything connecting to your business

Product Features

Adaptive Authentication

Extend verification of a user identity with contextual risk checks

Multi-Factor Authentication

Leverage a broad portfolio of authentication factors for desktop and mobile

Intelligent Risk Engine

Protect your identities with advanced risk profiling analytics

Single Sign-On

Provide app discovery and one-click login through portal or desktop SSO

User Lifecycle Management

Enable admins with strong CRUD capabilities and users with self-service tools

Secure All Identities

CIAM

Customer Identities

Deliver a frictionless customer experience safeguarding user data and privacy

B2E

Workforce Identities

Govern and control access rights for employees, partners, and contractors

Moving Beyond Passwords

Learn how passwords alone no longer provide the appropriate level of protection, nor confidence, required to secure valuable resources

Initiatives

Passwordless Authentication

Reduce the risk of breaches by eliminating passwords

2FA is Not Enough

Block popular phishing and brute force attacks used by bad actors

Protecting Office 365

Extend adaptive authentication and flexible MFA to all apps including Office 365

Securing Portals and Web Apps

Balance strong security and an exceptional user experience

RSA Migration

Transition to a modern identity and access management solution

Industries

Healthcare

Financial Services

Retail

Energy and Utilities

Public Sector

Resources

White Papers

eBooks

Recorded Webinars

Analyst Reports

Innovation Labs

Documentation

Support Portal

Events & Webinars

Events

Webinars

Calculate Your Savings

Lower support costs by enabling your users the control to reset passwords, account unlocks, device enrollment and update profiles

Meet SecureAuth

About SecureAuth

Leadership

Newsroom

Careers

Contact