Products & Solutions
Support & Services
IT Professional Services
Education and Training
News and Events
No organization, including yours, is immune from the effects of cybercrime. From healthcare to financial services to consumer goods, etc., there isn't an industry today left untouched by cybercriminals. Unauthorized access to sensitive data presents a pervasive threat to an organization's brand equity, competitive posture, and reputation. Given today's evolving threat landscape, traditional identity and access management technologies no longer suffice. Corporate leaders are justifiably concerned about the impact of a security incident, and pressure is mounting to not only detect but, more importantly, prevent threats. Whether their goal is to disrupt, embarrass, or profit from private information, the growing cadence of breaches illustrates the need to raise the level of security across the environment. Fortunately, the next-generation identity and access management solutions employ advanced risk-based authentication techniques that adapts to match the risk at hand.
The need for a higher level of identity verification is illustrated by the continual stream of breaches announced each week. Recognizable brand names such as Sony, Target, Home Depot, NP Morgan Chase, Anthem, etc. reminds us how close we all are to risking customer trust and financial loss.
Compared to the traditional use of credentials, risk-based authentication (also known as adaptive authentication) is a dynamic level of identity verification. It's intelligent in that it leverages the user's behavior and other distinctive attributes to decide if additional steps are needed to verify that the user is who he claims to be. Those characteristics include properties like location, time of access, whether the device is known, as well as the type of asset being accessed. Not all internal information sensitive not does it create the same level of risk. NetIQ Access Manager's risk-based authentication engine can process all that context and more to determine if another level of identity validation is needed.
It comes down to elements that identify known characteristics as well as personal routine behavior:
Location of access contributes to the risk score of access:
Login parameters contribute to the risk score of access:
Risk of information or services:
Once you understand at a higher level how you want to measure your risk, it's time to create policies to protect accordingly. A key advantage of Access Manager is that unlike many of the more robust solutions on the market, you don't need a team of developers or specialists to configure and deploy risk-based authentication.
This dynamic approach to step-up authentication to just the right level is an essential component to upgrading the security of your organization's digital environment, but it can also be used to increase customer convenience and employee productivity. When you're able to narrow the situations where user verification is warranted, you have the flexibility to limit when a single, second, or strong authentication is invoked. This means that with Access Manager you can measure the risk posed by the data and the users and deliver unfettered access as often as possible while your organization can manage risk where it matters most.
The payoff of risk-based authentication is especially high for organizations needing to optimize their customers experience and encourage additional engagement. Access Manager's risk-based authentication can also be used to allow users to use their social credentials as often as possible and only upgrade to a verified account when performing a sensitive operation like a financial transaction or accessing regulated information. The same is true with partners that need access to your product and inventory information. Lower risk information can be provided if the device is known or authentication occurred earlier in the day, but require an additional step of identity verification once more sensitive information is requested, making it easier for your partner to do business with you.
NetIQ provides security solutions that help organizations with workforce and consumer identity and access management at enterprise-scale. By providing secure access, effective governance, scalable automation, and actionable insight, NetIQ customers can achieve greater confidence in their IT security posture across cloud, mobile, and data platforms.
Visit the NetIQ homepage to learn more. Watch video demos on our NetIQ Unplugged YouTube channel.
NetIQ is part of CyberRes, a Micro Focus line of business.
What is Zero Trust
NetIQ Unplugged YouTube channel
KuppingerCole Leadership Compass for IGA
KuppingerCole Leadership Compass for Access Management
NetIQ Online Community
NetIQ Advanced Authentication’s Framework (Supported Methods)
NetIQ Product Documentation
Video: IAM Strategy by NetIQ
What is Adaptive Access Management?
What Is Identity Governance and Administration?
What is Identity and Access Management?