Risk Based Authentication

Identity, Device, and Behavior analytics evaluated in real-time

In addition to physical and virtual tokens, Anomalix offers intelligent risk-based authentication that uses supervised and unsupervised algorithms that determine when an additional form of authentication is required. On premise and Cloud applications are protected by ensuring three key factors:

1) Something the user knows
2) Something the user has
3) Something the user does

Quickly determine when to deny access based on anomalous activity derived from Identity, Device, and Behavior analytics that are evaluated in real-time to enable only trusted access to organizational resources and data.

Read the white paper