
Adaptive Access Control
The perfect balance between context-aware access and customer experience
Adaptive MFA
Multi-Factor Authentication (MFA) is an important step in defending your brand’s reputation against data breaches and fraud. By adding an additional layer of protection, you can better ensure you know who you’re doing business with.
According to the Verizon Data Breach Investigations Report, 81 percent of breaches involve using stolen or weak credentials.
Adaptive MFA provides all of its capabilities via hosted pages, predefined workflows, and API’s/SDK, ensuring you can leverage these protections in your existing technology investments.
Multi-factor Authentication covers a variety of methods:
SMS OTP
Email OTP
Push OTP
Voice OTP
Push / Accept
Magic Links
TOTP Token
FIDO U2F Token
A common MFA impediment is usability – your customers become frustrated during complicated log-in processes. Striking the right balance between security and usability is critical to developing growth and brand loyalty.
Goodbye old factor authentication, hello Adaptive MFA
Using Adaptive MFA, your brand can achieve the perfect ratio of trust and customer experience.
- Establish high levels of trust and identity assurance
- Stay out of your customer’s way unless active risk detected
- Provide a delightful customer experience
- Ensure rapid return on investment with your multi-channel experiences
- Maintain flexibility in your customer journeys through configurable workflows
Adaptive MFA: What makes the magic happen?
We don’t like buzz words. You won’t find us talking about learning machines, intelligent clouds or even how new our math is. Instead, we believe in using modern approaches to solve real problems.
Risk analysis is at the core of Adaptive MFA, and Strivacity has the strongest set of risk analysis techniques. By analyzing the broadest number of different risk indicators, we are able to provide the safety net you need, while keeping your users engaged.
Here’s how we detect and minimize risk for your brand:
Device Risk Analysis
- Known Device Detection
- SIM Swap Detection
- Phone Number Reputation
- Tampered Phone Detection
Location Risk Analysis
- New Location Detection
- Location Allow/Deny Lists
- Improbable Travel Detection
- Geo-fence
Network Risk Analysis
- Anonymous Network Detection
- Bot Network Detection
- Transparent Proxy Detection
- New Network Detection
- IP Allow/Deny Lists
Password Risk Analysis
- Password Stuffing Detection
- Breached Password Detection
- Password Re-use Detection
- Password Brute Force Detection
Optimized Customer Outcomes
Your customer’s experience should be guided by the discovery, assessment, and prioritization of risk. Adaptive MFA provides you the ability to quickly influence and balance the customer’s experience and risk.
Here's how we do it:
Step-up Authentication
- Recommend for high-value transactions or when risk is detected
Step-down Authentication
- Enhanced customer experience when no risk is detected
Revoke Authentication
- Gracefully deny access without compromising the customer experience
Redirection
- Granular control over the customer journey
Integration
Ease the pain of integrating customer identities into the rest of your existing technology investments and makes connecting with partners easy if they have their own identity provider (IDP).
During an interaction with your brand, your customers should only log in once to your portal or website, and enjoy a seamless, uninterrupted experience through their customer journey.
Support for all of the major industry-standard integration methods

OpenID

OAuth
SAML
By leveraging these standards, we’re able to quickly and easily integrate to solve the most common problems brands face:
Unifying your customer identities using federated integrations allow your customers to log in once and use their profiles anywhere you want them to – even if you have multiple brands that share customer data and/or infrastructure.
Social Registration and Log-In
Leveraging social media logins can greatly speed up registration time and reduce abandonment.
Continuous Access
Mitigate business risk with the highest fidelity Identity Corroboration.
Your authentication system should discover, assess and prioritize risk. When risk is identified, proactive measures are needed to safeguard a customer’s credentials and your brand – in a way that does not impact customer experience.
Risk is always present
Traditional authentication schemes address risk as a one-time event. This approach puts too much focus on a singular allow or deny decision, versus the continual increase of trust, and reduction or outright revocation of access.
Strivacity Fusion provides all of its capabilities via hosted pages, predefined workflows, and API’s/SDK, ensuring you can leverage these protections in your existing technology investments.
Our philosophy on risk analysis is simple. We look carefully at all signals attackers exhibit when they orchestrate identity-related attacks against your brand.
Continuous Access: signals of risk
Location-based Signals of Risk
Device-based Signals of Risk
Network-based Signals of Risk
Password-based Signals of Risk
Because Continuous Access is always looking for risk throughout the entire time that a customer is engaged (and not just once at authentication) it means you can take immediate action to notify and take proactive steps to revoke access or ask the customer to prove that they are who they claim to be.
With this approach, rest assured you will always be at the forefront of continuously detecting identity-related risk throughout your customers’ omnichannel interactions with your brand.
Identity Threat Detection
Adaptive MFA and Continuous Access provide great customer experience while safeguarding your brand and most importantly your customers.
While this continuously discovers, assesses and mitigates steps against authentication risk, coverage shouldn't stop there.
Your security posture wouldn't be complete without the ability to monitor customer identity risk, and provide the information and visibility to your existing monitoring or managed security investment.
How we help
We understand the importance of using identity-related data to discover, monitor and hunt for threats. We also understand how difficult this can be in practice. Here’s how we help: