> IBM > The Forrester Wave: Risk - Based Authentication

The Forrester Wave: Risk - Based Authentication

Published By: IBM
IBM
Published:  Oct 26, 2017
Length:  17 pages

Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).

In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions, RSA, SecureAuth, and ThreatMetrix and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.



Tagsrisk based authentication, account takeover, intellectual property, sensitive data, identity management