Adaptive multi-factor authentication

Strivacity’s Risk Engine™ prompts customers for MFA based on risk signals

According to the Verizon Data Breach Investigations Report, 81 percent of breaches involve using stolen or weak credentials.

Risk analysis

Use Adaptive MFA to prompt customers for multi-factor authentication when the Strivacity Risk Engine™ flags unusual activity based on the following signals:

Location-based signals of risk

Activity from undesired locations or based on improbable travel

Device-based signals of risk

Activity from new, unknown or tampered devices

Network-based signals of risk

Activity from anonymous, malicious, unknown or bot networks

Password-based signals of risk

Attempted activity using password stuffing, brute-forcing or a breached password

Using adaptive MFA helps you strike the right balance between trust and creating a great customer experience

  • Establish high levels of trust and identity assurance
  • Stay out of your customers’ way unless you detect active risk
  • Provide a delightful customer experience
  • Ensure rapid return on investment across multi-channel experiences
  • Personalize customer journeys with configurable workflows

Multi-factor authentication

Strivacity’s native multi-factor authentication capabilities let you use and embed MFA into any application. Pick and choose which MFA methods to use (and when) for each application without costly integrations or reliance on third-party solutions.

SMS OTP
Email OTP
Push OTP
Voice OTP
Push / Accept
Magic Links
TOTP Token
FIDO U2F Token

Optimized customer journeys

Get your customers into your site fast, with minimal friction … unless you’re not sure they’re actually your customer. Adaptive MFA lets you step-up your authentication protocol when things look phishy.

Here’s how:

Step-up authentication
  • Recommended for high-value transactions or when you detect risk
Step-down authentication
  • Enhanced customer experience when no risk is detected
Revoke authentication
  • Gracefully deny access without compromising the customer experience
Redirection
  • Granular control over the customer journey

Icons-MFA Third-party risk detection

Give your security teams the context they need to detect and respond to threats with automated alerting (and remediation) for any event along the customer lifecycle. We can even send the data to your managed security or managed detection and response (MDR) provider

  • Push any account event to SIEM or SOAR for alert triage and prioritization
  • Generate security events pre- and post-execution for account activities
  • Use identity related data to discover, monitor and hunt for threats