Adaptive Multi-Factor Authentication
The perfect balance between context-aware access and customer experience
Are you a developer?
Start building now!
According to the Verizon Data Breach Investigations Report, 81 percent of breaches involve using stolen or weak credentials.
Risk Analysis
Use Adaptive MFA to prompt customers for multi-factor authentication only when risk is detected by Strivacity’s Risk Engine:
Location-based Signals of Risk
Device-based Signals of Risk
Network-based Signals of Risk
Password-based Signals of Risk
Using Adaptive MFA, your brand can achieve the perfect ratio of trust and customer experience.
- Establish high levels of trust and identity assurance
- Stay out of your customer’s way unless active risk detected
- Provide a delightful customer experience
- Ensure rapid return on investment with your multi-channel experiences
- Maintain flexibility in your customer journeys through configurable workflows
Multi-Factor Authentication
Use and embed multi-factor authentication into any application. Pick and choose which MFA methods to use for each application and when to use them:
SMS OTP
Email OTP
Push OTP
Voice OTP
Push / Accept
Magic Links
TOTP Token
FIDO U2F Token
Strivacity Fusion’s Multi-factor Authentication is built-in and pre-configured without requiring additional 3rd parties or integrations
Optimized Customer Journeys
Your customer’s experience should be guided by the discovery, assessment, and prioritization of risk. Adaptive MFA provides you the ability to quickly influence and balance the customer’s experience and risk.
Here's how we do it:
Step-up Authentication
- Recommend for high-value transactions or when risk is detected
Step-down Authentication
- Enhanced customer experience when no risk is detected
Revoke Authentication
- Gracefully deny access without compromising the customer experience
Redirection
- Granular control over the customer journey
Third-Party Risk Detection
Insert threat detection and mitigation into any point in the customer lifecycle, giving security teams highly contextual alerting when threats are detected:
- Use identity related data to discover, monitor and hunt for threats
- Generate security events pre and post execution of account activities
- Push any account event to SIEM or SOAR for alert triage and prioritization
Use a managed security or managed detection and response (MDR) or SOC as a Service? We can give the service provider the customer-related identity related identity information needed to enhance visibility