Quantcast
543440698c42174c76dce2c1_EDC_logo-white.png

Entrust IdentityGuard Adaptive Authentication

auth-header-adaptive-auth-01
Adaptive Authentication

ADAPTIVE AUTHENTICATION PROVIDES
STRONG & TRANSPARENT
SECURITY FOR ONLINE AND
MOBILE CHANNELS

Free White Paper - 5 Ways to Ensure Digital Business Success

AUTHENTICATE USERS & TRANSACTIONS
BASED ON RISK PROFILES

Hackers continually change their method of attack. Our risk-based authentication solution
adapts and anticipates those threats and provides real security, without creating friction for
your users. Our Adaptive Authentication solutions analyze hundreds of risk indicators to detect
and defeat suspicious activity. If potential risks or policy violations are detected, users are
presented with step-up challenges to confirm their identities.

DOWNLOAD THE BROCHURE

HOW OUR ADAPTIVE AUTHENTICATION SOLUTION WORKS

Our risk-based solution handles a broad array of inputs, including device fingerprint, device reputation
and area behavior. Decisions are made based on your defined policy settings.

Policy Engine

Device Certificate

Can be used to transparently validate authenticity of a user’s computer or mobile device.

IP Geolocation

Parameters can be assessed and balanced against a number of checks including:


IP Address – Is the IP address black-listed?
Expected location – is the user expected to authentication from this location?
Location History – has the user authenticated from this location previously?
Velocity – has the user authenticated from previous locations in a time frame that is inconsistent with the distance between the locations?

Device Fingerprint

When a user accesses the website or application, the device and access context is assessed in real time –weighing aspects of the device’s digital fingerprint.

Time of day, day of week

Configures security policy to access specific resources and applications between specific times and days of the week to different groups within the organization

Device Reputation

Recognizes and detects fraudulent behavior across all types of Internet devices including desktop, mobile and tablets, even prior to login, and integrates with websites and applications

DEPLOY QUICKLY & OPERATE EFFICIENTLY

Rich contextual policy management automatically adapts security according to access requirements
or the risk in a given transaction. Our adaptive authentication platform does not interfere with normal user
behavior or impact back-end applications. The simplicity and flexibility of our solution speeds
deployment and mitigates security costs.