Best Risk-based Authentication Software

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the risk-based authentication category, a product must:

  • Assess a user’s unique network, device, and behavior to determine risk
  • Prompt authentication measures after assessment
  • Utilize authentication methods such as SMS, questioning, or email confirmation
  • Periodically store and update suspicious networks, devices, and behaviors
G2 Crowd Grid® for Risk-based Authentication
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction

Help create this Grid®

We need more reviews for products in this category. Help by contributing a review.
Write a review

Get personalized Risk-based Authentication recommendations

1
2
3

Compare Risk-based Authentication Software

    Results: 22

    Apache Sentry
    0 reviews
    Get a Quote
    BioCatch
    0 reviews
    Get a Quote
    CA Advanced Authentication
    0 reviews
    Get a Quote
    Callsign
    0 reviews
    Get a Quote
    HYPR
    0 reviews
    Get a Quote
    Modirum 3D Secure
    0 reviews
    Get a Quote
    NetIQ Advanced Authentication
    0 reviews
    Get a Quote
    NuDetect
    0 reviews
    Get a Quote
    RSA Adaptive Authentication
    0 reviews
    Get a Quote
    TypindDNA
    0 reviews
    Get a Quote
    UnifyID
    0 reviews
    Get a Quote
    Zighra
    0 reviews
    Get a Quote
    Kate avatar
    Kate from G2 Crowd

    Learning about Risk-based Authentication?

    I can help.
    Get FREE professional recommendations in just a few minutes.