The Forrester Wave: Risk - Based Authentication

By: IBM
IBM

Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).

In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions, RSA, SecureAuth, and ThreatMetrix and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

Tags : risk based authentication, account takeover, intellectual property, sensitive data, identity management


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Oct 26, 2017
Length:  17
Type:  White Paper