Risk-based authentication

Businesses today are confronted by increasingly mobile users and an increasing number of threats. They are expected to provide user-friendly access to resources while reliably protecting data at the same time. The policy server is a powerful yet easy-to-use authentication solution that substantially improves the security of your systems. Risk-based authentication captures the implicit characteristics of users and devices, and analyzes user behavior in order to pinpoint deviations from regular behavior. These deviations can be used to determine how likely it is that a given login request is coming from the actual user or from a potential hacker. The higher the probability of an attack, the more comprehensive and restrictive the authentication process becomes.

Business Values

Active risk management

Device fingerprinting and IP intelligence are used to profile user behavior patterns and calculate a risk score. If behavior deviates from these identified patterns, automatic security mechanisms are activated in line with the level of risk.

Real-time risk-based authentication

The policy server includes a user-definable rule set, which evaluates user data and triggers appropriate responses if necessary. The process for creating rules is straightforward and does not require programming; these rules also enable the evaluation of information from external systems.

Adaptive authentication

Actions generated by the rule set can also be user defined. Alongside integrated functions such as denial of access, it is also easy to implement external actions such as notifying an anti-fraud team.

General marketability

The ti&m policy server supports common mobile operating systems (iOS, Android).

Harald Böttcher
Any questions about the ti&m security suite?

Give us a call or send us an email – Harald Böttcher will be happy to advise you.