SOLUTIONS

Two Factor Authentication

We recommend all apps implement two factor authentication. But how do you protect the users that don't opt-in?

Many companies now enforce Two Factor Authentication (2FA) in the login process to ensure only authenticated users gain access to confidential data. While this is a huge step in the right direction, there is still one roadblock to address: user participation. Enabling 2FA adds friction to the login process as the user must to wait to receive a token before gaining access. Even once you have convinced users to enable 2FA, how long will they keep it switched on?

Our solution is to make ThisData your first line of defense. Without causing any friction in the login process for your valuable customers, we analyze whether each user is actually who they say they are. Even when 2FA has been disabled by a user - or by a hacker who's up to no good - all logins are still being monitored for high risk behavioral anomalies. When we detect a login characteristic that doesn't match a user's behavioural profile - a suspicious IP address, new country, failed velocity check, an unknown device or one of many other risk factors - notifications can be sent to your app and your users to alert them to the threat.

Smart Authentication

Contextual Authentication

ThisData enables an improved user experience in your app by not asking for a two factor code on every login. Instead we verify the identity of the user based on the risk profile of the current login and your app can decide to skip the two factor code when the user appears to be who they should be. If the risk is high, then you can trigger your typical two factor workflow.

Behavioral Authentication

Opt-in rates for two factor authentication can be low, and it's more than likely that the users who don't opt-in are less tech savvy and at a higher risk of being compromised. ThisData complements your two factor implementation by building up a behavioral profile of every user that accesses your app. If the user does not have two factor enabled and the risk score of the login is high, then you can notify the user by email or SMS that their account may be compromised.

Behaviourial Authentication
Analyzers
Account Takeover
Analyzers
Two Factor Authentication
Analyzers
Continuous Authentication
Analyzers
Fraud Detection
Analyzers
Adaptive Authentication
Analyzers
Risk Scoring