RSA Adaptive Authentication is a complete fraud detection platform which leverages risk-based, multi-factor authentication to protect users accessing websites, online portals, mobile browsers and mobile applications. Adaptive Authentication analyzes more than one hundred risk indicators to identify suspicious user activity. Using a dynamic risk and rules-based approach, Adaptive Authentication can initiate requests for additional identity verification through a variety of methods, such as out-of-band and biometrics, for sessions that are high-risk and violate a policy.
Adaptive Authentication is supported by the RSA Risk Engine to generate a unique score for each user activity between 0 and 1,000, with 1,000 indicating the greatest level of risk. The score is reflective of device profiling, behavioral profiling, and matching to the eFraudNetork, a robust data repository containing information on known fraudulent IPs, devices, mule accounts and other cybercrime patterns. The Risk Engine combines rich data input, machine learning methods and authentication feedback to provide intelligent, real-time risk evaluations to mitigate fraud.
When a particular user activity crosses the risk threshold as defined by the RSA Risk Engine and the Policy Manager, Adaptive Authentication can further assure the identity of the user by initiating a Step-Up authentication:
Challenge questionsSecret questions that have been selected and answered previously by the end user.
Out-of-band (OOB) authenticationVia voice, SMS or e-mail
Knowledge-Based Authentication (KBA)Out of wallet questions that are gleaned in real time from a series of public and private databases, the answers to which are known only by the end user.
Multi-credential frameworkAdaptive Authentication integrates with existing and 3rd party authentication methods.
BiometricsFingerprint and eye biometrics (available for mobile users).
Balancing security & convenience, Adaptive Authentication offers a wide array of deployment and configuration options to meet the need of almost any organization. Adaptive Authentication can be deployed in three ways – on-premise, hosted or cloud. Using fine grained controls, organizations can provide risk-based authentication for their entire user base and allow the RSA Risk Engine to choose an appropriate step-up authentication method based on the risk score or access level of the user.