Skip to main content

What makes risk-based authentication solutions stand out?

Several vendors are touting their zero trust stories and the importance of wrapping risk "context" around every transaction. But when the technical details surface, does each vendor's risk engine stack up to the meet the challenge? In this Spark Matrix report, Quadrant Knowledge Solutions assessed risk-based authentication vendors on key competitive factors, such as:

  • Sophistication of technology capabilities
  • Technology vision and roadmap
  • Vendor's expertise and domain knowledge
  • AI, ML, and advanced analytics
  • Integration and interoperability

See why IBM was named a leader amongst the 20 vendors evaluated.

What makes risk-based authentication solutions stand out?

Several vendors are touting their zero trust stories and the importance of wrapping risk "context" around every transaction. But when the technical details surface, does each vendor's risk engine stack up to the meet the challenge? In this Spark Matrix report, Quadrant Knowledge Solutions assessed risk-based authentication vendors on key competitive factors, such as:

  • Sophistication of technology capabilities
  • Technology vision and roadmap
  • Vendor's expertise and domain knowledge
  • AI, ML, and advanced analytics
  • Integration and interoperability

See why IBM was named a leader amongst the 20 vendors evaluated.

Already have an IBM account? Log in

Quadrant Knolwedge Solutions: Spark Matrix for Risk-Based Authentication, 2021

1. Contact information

Phone
Open menu
We use phone in order to reach you for account related matters or, with your permission, to contact you related to other products and services.

2. Additional information