Adaptive Multi-Factor Authentication

The perfect balance between context-aware access and customer experience

Are you a developer?

Start building now!

According to the Verizon Data Breach Investigations Report, 81 percent of breaches involve using stolen or weak credentials.

Risk Analysis

Use Adaptive MFA to prompt customers for multi-factor authentication only when risk is detected by Strivacity’s Risk Engine:

Location-based Signals of Risk

Activity from undesired locations or based on improbable travel

Device-based Signals of Risk

Activity from new, unknown or tampered device

Network-based Signals of Risk

Activity from anonymous, malicious, unknown or bot networks

Password-based Signals of Risk

Attempted activity using password stuffing, brute-forcing or a breached password

Using Adaptive MFA, your brand can achieve the perfect ratio of trust and customer experience.

  • Establish high levels of trust and identity assurance
  • Stay out of your customer’s way unless active risk detected
  • Provide a delightful customer experience
  • Ensure rapid return on investment with your multi-channel experiences
  • Maintain flexibility in your customer journeys through configurable workflows

Multi-Factor Authentication

Use and embed multi-factor authentication into any application. Pick and choose which MFA methods to use for each application and when to use them:

Email OTP
Push OTP
Voice OTP
Push / Accept
Magic Links
TOTP Token
FIDO U2F Token

Strivacity Fusion’s Multi-factor Authentication is built-in and pre-configured without requiring additional 3rd parties or integrations

Optimized Customer Journeys

Your customer’s experience should be guided by the discovery, assessment, and prioritization of risk. Adaptive MFA provides you the ability to quickly influence and balance the customer’s experience and risk.

Here's how we do it:

Step-up Authentication
  • Recommend for high-value transactions or when risk is detected
Step-down Authentication
  • Enhanced customer experience when no risk is detected
Revoke Authentication
  • Gracefully deny access without compromising the customer experience
  • Granular control over the customer journey

Icons-MFA Third-Party Risk Detection

Insert threat detection and mitigation into any point in the customer lifecycle, giving security teams highly contextual alerting when threats are detected:

  • Use identity related data to discover, monitor and hunt for threats
  • Generate security events pre and post execution of account activities
  • Push any account event to SIEM or SOAR for alert triage and prioritization

Use a managed security or managed detection and response (MDR) or SOC as a Service? We can give the service provider the customer-related identity related identity information needed to enhance visibility