Read the White Paper


  • ​Realize significant reductions in online fraud across the web and mobile channels.

  • ​Integrates with a broad range of step-up authentication options, including out-of-band SMS and phone, biometrics via fingerprint and eyeprint, knowledge-based authentication, transaction signing, and more.

  • ​Proven technology: Protects more than 500 million global users across 8,000+ global installations.

  • ​Provide a frictionless customer experience with transparent authentication for 95 percent of users.

  • ​Offers advanced risk scoring against the most sophisticated fraud and is enhanced by direct feeds from the RSA eFraudNetwork, a cross-industry repository of data about known fraudulent device profiles, IP addresses and accounts.


  • Omni-Channel Protection

    Unique risk module protects users across the web and mobile channels.

  • RSA Risk Engine

    RSA Adaptive Authentication is supported by the proven RSA Risk Engine to generate a unique score for each user activity between 0 and 1,000. The Risk Engine combines rich data input, machine learning methods and authentication feedback to provide intelligent, real-time risk evaluations to mitigate fraud.

  • Case Management

    RSA Adaptive Authentication enables effective investigation of suspected fraud with a Case Management application for tracking transactions that have been blocked or failed an authentication challenge.

  • User Authentication Options

    RSA Adaptive Authentication supports numerous step-up authentication methods for high-risk activities including out-of-band SMS and phone, biometrics via fingerprint and eyeprint, knowledge-based authentication and more.

  • Flexible Deployment

    Adaptive Authentication offers flexible deployment options to meet an organization’s needs and address its unique environment. It can be deployed three ways: on-premise, hosted or cloud. Using fine-grained controls, organizations can provide risk-based authentication for their entire user base and allow the RSA Risk Engine to choose appropriate step-up authentication based on the risk score or access level of the user.