Adaptive Authentication
Multi-Layered Defense
Adaptive Authentication acts like layers in a bulletproof vest — analyzing multiple factors to confidently determine the legitimacy of every login, thwart attacks in-process, and keep your valuable resources and data safe.
Device Recognition
Ensures the device being used is known and recognizable
Threat Service
Analyzes IP addresses of incoming access requests for known bad IPs and malicious behavior
Directory Lookup
Compares identity profiles with standard practices to thwart fake profiles from being used
Geo-Location
Compares a user's login location against known locations for employees, partners and customers
Geo-Velocity
Keeps an eye out for access requests spanning different locations that aren't physically possible
Geo-Fencing
Treat access requests coming from within and outside a customer-defined geographic barrier differently
Phone Number Fraud Prevention
Block access requests from ported phones, carriers, and phone types (e.g. Mobile, Landline, VoIP, etc.)
Behavioral Biometrics
Thwarts attacks by using user keystrokes and mouse movements for a unique behavioral signature
Identity Governance
Identify users with high-risk access rights and adapt authentication to protect this vulnerability
User & Entity Behavior Analytics
Treat access requests differently when user behavior strays from the normal