Skip to main content
purple hex pattern
woman sitting and looking at mobile phone

Get risk-based authentication that works behind the scenes

When users request access, the access context is assessed in real-time by our policy engine. And a decision is made to either grant access or challenge it. By automatically assessing each user login attempt, our technology speeds access to important data for the users who need it and are authorized to access it.

What is risk-based adaptive authentication?

Risk-based adaptive authentication considers a user's risk level when authenticating them to access a resource or system. The risk score is calculated by evaluating various factors such as location from which they are authenticating, type of device they are using, whether they are logging in from an IP address for a restricted geography, etc.

adaptive authentication

How does it work?

how does risk-based adaptive authentication work?

Experience the Benefits of Risk-Based Adaptive Authentication

hacker icon

Prevent Unauthorized Access

To systems and data by requiring additional verification steps for high-risk users or activities.

fingerprint icon

Improve the User Experience

By reducing the number of required login steps when risk is low.

bullseye target icon

Customizable

To the specific needs of an organization, allowing for a more tailored approach to security by weighting factors based on the use case.

Identity Portfolio

IAM

Identity Enterprise


Discover Identity Enterprise and learn how Entrust’s identity access management solutions can protect your organization from cyber risk.
IAM

Identity Essentials


Explore Identity Essentials and how its multi-factor authentication software can protect your enterprise.

Our Identity Portfolio Capabilities

Authenticate

Streamline the onboarding of diverse users and devices with a wide range of technologies.

Authorize

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Transact and Manage

Continuously protect against advanced threats with technology from behavior analytics to fraud detection.

Entrust Identity Use Cases

Get Entrust Identity as a Service Free for 60 Days

Explore the Identity as a Service platform that give you access to best-in-class MFA, SSO, adaptive risk-based authentication, and much more.