Risk-Based Authentication

In addition to physical and virtual tokens, Anomalix offers intelligent risk-based authentication that uses supervised and unsupervised algorithms that determine when an additional form of authentication is required. On premise and Cloud applications are protected by ensuring three key factors:

Quickly determine when to deny access based on anomalous activity derived from Identity, Device, and Behavior analytics that are evaluated in real-time to enable only trusted access to organizational resources and data.