Fraud Prevention

RSA Adaptive Authentication is a complete fraud detection platform which leverages risk-based, multi-factor authentication to protect users accessing websites, online portals, mobile browsers and mobile applications. Adaptive Authentication analyzes more than one hundred risk indicators to identify suspicious user activity. Using a dynamic risk and rules-based approach, Adaptive Authentication can initiate requests for additional identity verification through a variety of methods, such as out-of-band and biometrics, for sessions that are high-risk and violate a policy.

Adaptive Authentication is supported by the RSA Risk Engine to generate a unique score for each user activity between 0 and 1,000, with 1,000 indicating the greatest level of risk. The score is reflective of device profiling, behavioral profiling, and matching to the eFraudNetork, a robust data repository containing information on known fraudulent IPs, devices, mule accounts and other cybercrime patterns. The Risk Engine combines rich data input, machine learning methods and authentication feedback to provide intelligent, real-time risk evaluations to mitigate fraud.

When a particular user activity crosses the risk threshold as defined by the RSA Risk Engine and the Policy Manager, Adaptive Authentication can further assure the identity of the user by initiating a Step-Up authentication:

Challenge questions
Secret questions that have been selected and answered previously by the end user.
Out-of-band (OOB) authentication
Via voice, SMS or e-mail
Knowledge-Based Authentication (KBA)
Out of wallet questions that are gleaned in real time from a series of public and private databases, the answers to which are known only by the end user.
Multi-credential framework
Adaptive Authentication integrates with existing and 3rd party authentication methods.
Fingerprint and eye biometrics (available for mobile users).
Transaction signing

Provides integrity assurance, cryptographic signature and authenticity for payment transactions to combat fraud from advanced financial malware attacks. Transaction signing can optionally integrate with biometrics as a stronger means of authentication layered on top of the payment transaction signature.

Balancing security & convenience, Adaptive Authentication offers a wide array of deployment and configuration options to meet the need of almost any organization. Adaptive Authentication can be deployed in three ways – on-premise, hosted or cloud. Using fine grained controls, organizations can provide risk-based authentication for their entire user base and allow the RSA Risk Engine to choose an appropriate step-up authentication method based on the risk score or access level of the user.

click here to see more resources
More resources
Check out our demo. Try before you buy!
Check out our presentation!
Check out our proof of concept!