Check out technical articles, developer guides and more in Verify’s new documentation hub

Check out technical articles, developer guides and more in Verify’s new documentation hub Read the docs

Risk-based authentication and adaptive access control

Allow streamlined access to low-risk users and either block or challenge access in higher-risk conditions with contextual, risk-based authentication and adaptive access. Organizations can use a simple policy editor to apply AI-informed access policies to prompt for MFA based on deep fraud detection signals across user, device, activity, environment and behavior context and the resulting holistic risk score.

Proactively protect your users

 

Screen shot of adaptive access controls in IBM Security Verify for Workforce

Comprehensive context is key

To make accurate authentication decisions, AI and machine learning aided analysis of interactions simultaneously taking place is essential. Contextual parameters span:

  • User – profile attributes like phone number and email address and their reputation

  • Device – consortium data for device risk, organizational policy compliance, malware detection, virtual environment and remote access trojan detection, device fingerprinting, mobile hygiene

  • Activity – compare activity to detect anomalies from general population or job role, assess severity level of transactions

  • Environment – geolocation, time of day, and network connection evaluation, checking for exposed network, compromised DNS, malware in environment

  • Behavior – compare behavior against history to detect anomalies, behavioral biometrics like mouse movement, keystroke velocity, mobile phone positioning

Explore holistic risk indicators

Monitor risk levels of events

Filter authentication activity to diagnose problems and view details of high-risk events that are sent to case management.

Investigate identified risks

Screenn shot of adaptive access reports in IBM Security Verfiy

Watch the webinar: Why adaptive access prevails over risk-based authentication

Watch the webinar: Why adaptive access prevails over risk-based authentication View now

Testimonials