Feature spotlights

Enhance security with adaptive multi-factor authentication

Enhance security and address compliance mandates with custom authentication policies. Infuse multiple user authentication methods for stronger security.

Provide step-up authentication for high risk users

Step-up authentication only for high-risk users and transactions, while providing a more seamless experience for those with low risk.

Deliver seamless strong authentication options

Use context based authentication and risk assessment from the Pinpoint platform to build digital trust across the entire customer lifecycle.

Enable identity proofing across the omnichannel journey

Provide an omnichanel experience, with the same risk logic and authentication across channels.

How customers use it

  • Adaptive step-up authentication for high risk users

    Adaptive step-up authentication for high risk users

    Problem

    Remediate identity risk.

    Solution

    Deliver one-time passcodes via email, SMS or mobile push notification and enable bioiometric authentication, including fingerprint, face and user presence.

  • User friendly multi-factor authentication

    User friendly multi-factor authentication

    Problem

    Ensure strong authentication to any target system.

    Solution

    Quickly enable MFA mechanisms (email, one-time-passwords, mobile push) on an app-by-app basis.

  • Help address regulatory requirements

    Help address regulatory requirements

    Problem

    PSD2 and FFIEC now require strong authentication.

    Solution

    Address FFIEC, 2FA, or PSD2 standards with a unified platform for fraud detection, and transparent, multi-factor authentication.

You may also be interested in

Consider these related digital identity trust products

IBM Security Access Manager

Secure and simple user access management for employees and consumers.

Learn more

IBM Cloud Identity

Easily bridge from on-prem identity and access management to the cloud

Learn more

IBM Z Multi-Factor Authentication

Guard applications and data by adding authentication factors to logons

Learn more

See how it works

Learn more