You want choices for your authentication methods in order to find the right fit for each type of asset you’re protecting and each type of user you’re enabling. Options include:
• Mutual authentication
• SMS/email one-time passwords (OTP)
• Push notifications
• Grid cards
• Mobile smart credentials
• Soft or hard tokens
A wide range of authenticators ensures seamless support to different user groups and security needs throughout the extended enterprise — all from a single point of administration.
The most secure approach for managing diverse users will also offer multi-level authentication, which is crucial in cases such as transaction approvals.
Types of multi-level authentication include:
Transactional Analytics and Behavioral Biometrics
Identify potentially fraudulent behavior by analyzing user behaviors. Automatically monitor frequency of logins, adding an abnormal number of payees or varying touch/swipe motions on a mobile device.
Configurable and Adaptive Risk-Based Policies
Effective policies allow administrators to define access control policies on a per-application or per-user group basis, using weighted risk factors, risk-level definitions and policy-based authentication decisions.
For higher risk situations, it’s important to enable step-up authentication that’s still frictionless for users — options include mobile push authentication, touch ID or Bluetooth wireless login.
This capability helps you recognize and stop fraud and abuse in real time, prior to login. You can also verify the integrity of devices before trusted identities are provisioned to users.
Request a demo with an IntelliTrust authentication platform specialist.
Experienced security professionals in corporations, banks and government agencies know the name IdentityGuard and trust it to protect and enable what matters to them.