Executive View: RSA Adaptive Authentication - 70889

Report Details

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and context-based authentication and authorisation methodology provides transparent authentication for the majority of the users, and provides an appropriate level of risk mitigation for those who are in untrusted positions. The level of assurance for a given identity depends on the risk of identity theft calculated from the user´s activity or the criticality of the resources to which access is requested...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 17, 2013

Executive View: RSA Adaptive Authentication - 70889

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and…

€190.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Executive View

Executive View: LSE LinOTP - 71452

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected…

Leadership Compass

Leadership Compass: Dynamic Authorization Management - 70966

Dynamic Authorization Management is arguably the most exciting area in identity and access management today. It is the way in which organizations leverage their identity and access management environment to control access to restricted resources. Access control to file shares, network…

Advisory Note

Advisory Note: Trends in Authentication and Authorization - 71043

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

Executive View

Executive View: SecureKey briidge.net™ - 71016

SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There…

Advisory Note

Scenario: The Future of Authentication - 70341

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to…

Advisory Note

Advisory Note: Strong Authentication - 70261

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides…

Executive View

Snapshot: Thales SafeSign Authentication Suite - 70383

Thales SafeSign is a set of stand-alone modules that comprises the full feature-set of so called Versatile Authentication Servers or Platforms (VAS or VAP). It can be deployed as authentication server for token and mobile based One Time Password (OTP), Challenge and Response, EMV/CAP and…

Advisory Note

Market Overview Strong Authentication

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought…