Secure Consumer Access
RSA Adaptive Authentication
RSA Adaptive Authentication is a complete fraud detection platform that leverages risk-based, multifactor authentication to protect users accessing websites, online portals, mobile browsers and mobile apps. Using a dynamic risk- and rules-based approach, RSA Adaptive Authentication can initiate requests for additional identity verification through a variety of methods for sessions that are high-risk or violate a policy.
- Four-year leader in the Gartner® Magic Quadrant for User Authentication.
Read the White Paper
Realize significant reductions in online fraud across the web and mobile channels.
Integrates with a broad range of step-up authentication options, including out-of-band SMS and phone, biometrics via fingerprint and eyeprint, knowledge-based authentication, transaction signing, and more.
Proven technology: Protects more than 500 million global users across 8,000+ global installations.
Provide a frictionless customer experience with transparent authentication for 95 percent of users.
Offers advanced risk scoring against the most sophisticated fraud and is enhanced by direct feeds from the RSA eFraudNetwork, a cross-industry repository of data about known fraudulent device profiles, IP addresses and accounts.
Unique risk module protects users across the web and mobile channels.
RSA Risk Engine
RSA Adaptive Authentication is supported by the proven RSA Risk Engine to generate a unique score for each user activity between 0 and 1,000. The Risk Engine combines rich data input, machine learning methods and authentication feedback to provide intelligent, real-time risk evaluations to mitigate fraud.
RSA Adaptive Authentication enables effective investigation of suspected fraud with a Case Management application for tracking transactions that have been blocked or failed an authentication challenge.
User Authentication Options
RSA Adaptive Authentication supports numerous step-up authentication methods for high-risk activities including out-of-band SMS and phone, biometrics via fingerprint and eyeprint, knowledge-based authentication and more.
Adaptive Authentication offers flexible deployment options to meet an organization’s needs and address its unique environment. It can be deployed three ways: on-premise, hosted or cloud. Using fine-grained controls, organizations can provide risk-based authentication for their entire user base and allow the RSA Risk Engine to choose appropriate step-up authentication based on the risk score or access level of the user.