Adaptive Authentication
Strengthen Security with Adaptive Authentication
What is Adaptive Authentication?
Adaptive authentication is a method of verifying user identity and authorization levels based on contextual factors. These factors include: Location, Device status, User behavior, User risk profile, and User role.
Adaptive authentication is an MFA method. It enables an identity provider (IDP) to dynamically adjust the authentication requirements based on these factors during user login.
Each time someone tries to authenticate, the request is evaluated and assigned a risk score. Depending on the risk score, the user may be required to provide additional credentials or, conversely, allowed to use fewer credentials.


Where are you on the authentication maturity curve?
Adaptive Authentication v Continuous Authentication
Adaptive authentication is a method of verifying user identity and authorization levels based on contextual factors. These factors include: Location, Device status, User behavior, User risk profile, and User role.
Adaptive authentication is an MFA method. It enables an identity provider (IDP) to dynamically adjust the authentication requirements based on these factors during user login.
Each time someone tries to authenticate, the request is evaluated and assigned a risk score. Depending on the risk score, the user may be required to provide additional credentials or, conversely, allowed to use fewer credentials.
Deploy Dynamic Workflows with MFA
Through adaptive workflows you can combine MFA with login risk analysis to step-up or step-down authentication methods based on your risk threshold for each resource. Adaptive authentication provides the perfect balance of security, efficiency and convenience.


Third Party Risk Data
Integrate 3rd party risk assessment tools into your IAM and utilize the analysis as part of the overall authentication risk score for every unique access request.
Leverage the intelligence of existing investments from IGA, SIEM, UEBA, or other tools to improve your security posture and better protect your business.
Step-Up Authentication When Necessary
Depending on the type of application the user is trying to access, the authentication policy can switch to a step-up authentication.
The step-up authentication requires that when users try to access more sensitive information, they’re prompted for further authorization.

Device Recognition
Allow users to auto-enroll their devices/browsers minimizing prompts to re-type their username, password or MFA.
Delight your audience with a great experience especially on touch screen devices.


Geo-Location Analysis
A location anomaly will trigger a step-up MFA request to validate the user identity.

Behavioral Analytics
Benchmark user behavior to identify suspicious activity which increases protection against potential account compromise.
Stop bad actors or even insider threats exhibiting behaviors such as login attempts at odd hours, a change in login success or failure rates, or attempts to open restricted applications.
IP Address Validation
Utilize IP address zones to improve security and the user experience.
Set up Accept and Deny IP Lists to simplify authentication for users in trusted zones and reduce security risks coming from suspicious locations.
