SOLUTIONS

Adaptive Authentication

Adapative authentication, also called risk based authentication, is the process of using custom policies to identify and stop high-risk logins in their tracks.

User authentication to prevent account takeover

ThisData takes adaptive authentication to a new level by enabling a user's typical behavior to be used as a second factor of authentication. Rather than expecting your users to improve their security behavior, you can use their behavioral patterns to accurately identify them and improve security.

Our login intelligence algorithms process every user login for behavioral risk anomalies that may indicate a breach is in process. Our multi-layered approach passes the characteristics of each login through various filters and analyzers so that we can establish whether a user is actually who they say they are.

User authentication to prevent account takeover

  • Unknown devices
  • High risk IP addresses
  • Suspicious login locations
  • Tor usage
  • Whitelist and blacklist countries
  • Velocity checking
  • Geo-location anomalies
  • Project Honey Pot
  • AlienVault Open Threat Exchange
Account Takeover
Customized Security Workflows

Custom Authentication Workflows

Using the ThisData Verify API you can make real-time requests for a risk score on each user login. The score - which is returned within hundreds of milliseconds - can then be used to approve the login, prompt for a second factor of authentication, or block the bad actor if the risk is extremely high.

Analyzers
Account Takeover
Analyzers
Two Factor Authentication
Analyzers
Continuous Authentication
Analyzers
Fraud Detection
Analyzers
Adaptive Authentication
Analyzers
Risk Scoring