Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > IBM > The Forrester Wave: Risk - Based Authentication
 

The Forrester Wave: Risk - Based Authentication

White Paper Published By: IBM
IBM
Published:  Oct 26, 2017
Type:  White Paper
Length:  17 pages

Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).

In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions, RSA, SecureAuth, and ThreatMetrix and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.



Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management