Risk-Based Authentication

Don’t trade accessibility for security, or vice-versa

How do you secure access to sensitive resources while still making access reasonably easy for users who need it? Risk-based authentication answers the question by making access easier or tougher based on the risk an access attempt poses.

Risk based authentication

How SecurID Helps

Context-based assessment

SecurID risk-based authentication uses techniques and technologies including data collection, device matching, anomaly detection and behavioral analytics to determine the context for an access attempt (such as who seeks access, from where and what device) and then assesses access risk based on that context.

Machine learning

Machine learning

In addition to assessing the risk access requests pose, SecurID risk-based authentication learns from its assessments, and applies that knowledge to future requests. So, for example, the same user requesting access to the same resource from the same device every day won’t be challenged, but the same user on a new device will.

Authentication choices

Authentication choices

When the level of access risk warrants another factor of authentication, SecurID multi-factor authentication (MFA) provides a range of choices for strong authentication. The idea is to keep an illegitimate attempt from succeeding, but without placing an unnecessarily high burden on a legitimate user.


See How It Works

Embark on an interactive exploration of SecurID, and experience for yourself how secure and convenient access can be.