Authentication

Device Reputation

Leverage analytics to improve security and reduce user friction

Whether it’s employees, partners, consumers or citizens, you want to provide frictionless digital experiences. Our approach to device reputation adds a layer of transparent authentication, making it easy for you to deliver frictionless user experiences — while improving the strength of your digital security.

Entrust Datacard Authentication

The Intelligence to Detect and Prevent Fraud

Our device reputation technology features a rules engine that lets you decide when specific activities require step-up authentication. For example, if someone who appears to be an authorized user tries to access your network, but the device in-use is unfamiliar or previously used in a fraudulent manner, our solution will issue a challenge to the user. To do this, we leverage best-of-breed device identification, dynamic risk context and analytics from a global intelligence network.

Here’s How It Works

There’s no servers to manage or software to deploy. You simply use our cloud-based service to establish your policies and monitor activity on your networks.

Five simple steps:

1. A user visits your website or mobile app from any device

2. Device fingerprint and data attributes are collected via JavaScript or Mobile SDK

3. An Authentication or Fraud request is sent to our device intelligence platform for analysis

4. A customized real-time response is returned regarding the device and the transaction within milliseconds

5. Based on you predetermined policies, our solution either approves or denies access — or issues a step-up challenge for additional proof of identity

Hex

Key Features

Hex

Device ID and Registration

Affirm user identity by matching device fingerprints with a high degree of accuracy.
Hex

Device Change Tolerance

Built-in intelligence takes expected or typical device changes into consideration, minimizes false negative responses and establishes acceptable risk boundaries.
Hex

Reveal Hidden Connections

Understanding how a device links to known bad activity or other users will allow you to automatically enforce step-up authentication challenges if risk thresholds are exceeded.
Hex

Evasion Detection

Proxy piercing detects fraudulent servers that are often used by fraudsters, while leveraging advanced techniques to unmask TOR networks, VPNs, mobile VMs, emulators or other anonymizing activity.
Hex

Global Device Intelligence Platform

Real-time device feedback from thousands of risk analysts can help flag suspicious accounts and identify unauthorized devices.
Hex

"PII-less" Precision

Recognition technology uses hundreds of attributes to instantly identify a device without the need for the user’s personally identifiable information.

Popular Enterprise Use Cases

Hex

BYOD Integrity Check

Ensure the integrity of a new employee's device before issuing access to networks, apps and other assets.
Hex

Mobile Pre-ID Check

Ensure a device has not been associated with fraudulent activity before a trusted identity is provisioned.
Hex

Simplified Authentication

Reduce the number of times a user needs to authenticate by layering device analytics to identify low-risk situations.

Common Consumer Banking Use Cases

Hex

New Account Creation

Make secure identity proofing part of your application process when customers are creating online or mobile accounts.
Hex

Online & Mobile Banking

Make digital interactions with your bank seamless for users, while protecting what’s important to you and your customers.
Hex

Transaction Verification

Out-of-band transaction verification helps defeat advanced fraud attacks by adding a layer of security and assessing device integrity.

Request a Demo

Request a demo with an IntelliTrust authentication platform specialist.

Our Products

Cloud-Based Deployment

IntelliTrust™

Secure your enterprise and give your users secure access to everything — applications, networks, computers, doors — with cloud-based multi-factor authentication.

View All

On-Premises Deployment

IdentityGuard™

Experienced security professionals in corporations, banks and government agencies know the name IdentityGuard and trust it to protect and enable what matters to them.

SMS Passcode™

SMS Passcode authenticates users by sending a real-time, session-specific one-time passcode (OTP) to the user’s mobile phone via SMS, app, voice-call or email.

Our Authentication
Technologies:

Entrust Datacard Authentication

Establish Trust

Streamline the onboarding of a wide range of users and devices with a wide range of technologies available in our platform.

Entrust Datacard Authentication

Enable Access & Transactions

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Entrust Datacard Authentication

Maintain Trust

Continuously protect against advanced threats with technology ranging from behavior analytics to fraud detection.