Adaptive authentication, additionally referred as risk-based authentication, is the method of using custom policies to identify and stop risky logins in their tracks.
User authentication to prevent account takeover
With SecureNative adaptive authentication, the authentication process is taken to a whole new level by using a user's typical behavior patterns as a second factor of authentication. Rather than expect your users to improve their security behavior, you can use their behaviors to identify them and improve your security.
With our intelligence algorithm, each user is login checked against behavioral anomalies indicating that there is a violation in process. Our multi-layered approach traverses the characteristics of each login through various filters and analyzers so that we can determine if a user is really who they claims he is.
- Unrecognized and new devices
- Whitelist and blacklist countries
- Geo-location access anomaly detection
- GeoVelocity checking
- High-risk IP addresses
- Bad Reputation IP addresses
- Blacklisted IP addresses
- Tor and other anonymity networks
- Access from shared hostings and cloud providers
- Access from public proxies and VPN Services
- New and unusual login locations
Power Up Authentication by using custom workflows
The SecureNative Risk Score allows you to request a risk score in real-time for every user login. The score - is instantly calculated and can be used to approve the login, trigger 2FA or block the bad login attempt if the risk is too high.