• RSS
  • Twitter
  • FaceBook
Home > White Papers > IBM > The Forrester Wave: Risk - Based Authentication

The Forrester Wave: Risk - Based Authentication

By: IBM
IBM

Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).

In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions, RSA, SecureAuth, and ThreatMetrix and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

Email this page
Published:  Oct 26, 2017
Length:  17
Type:  White Paper
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter