Don’t trade accessibility for security, or vice-versa
How do you secure access to sensitive resources while still making access reasonably easy for users who need it? Risk-based authentication answers the question by making access easier or tougher based on the risk an access attempt poses.
How SecurID Helps
SecurID risk-based authentication uses techniques and technologies including data collection, device matching, anomaly detection and behavioral analytics to determine the context for an access attempt (such as who seeks access, from where and what device) and then assesses access risk based on that context.
In addition to assessing the risk access requests pose, SecurID risk-based authentication learns from its assessments, and applies that knowledge to future requests. So, for example, the same user requesting access to the same resource from the same device every day won’t be challenged, but the same user on a new device will.
When the level of access risk warrants another factor of authentication, SecurID multi-factor authentication (MFA) provides a range of choices for strong authentication. The idea is to keep an illegitimate attempt from succeeding, but without placing an unnecessarily high burden on a legitimate user.
See How It Works
Embark on an interactive exploration of SecurID, and experience for yourself how secure and convenient access can be.Experience SecurID