How do you distinguish between legitimate users and imposters without adding tedious authentication procedures? ThreatMetrix™ provides a fully transparent identification solution that can positively authenticate who is attempting access to online applications.

Cybercriminals are experts at obtaining user credentials via password cracking techniques, malware that captures keystrokes, phishing attacks, shared passwords, and other methods. Stopping hackers and fraudsters is critical. However, it’s also vital to make the authentication process simple and straightforward for legitimate users.

Traditional username password solutions are easily compromised. Third party authentication systems that utilize biometric devices or tokens add cumbersome steps to the login procedure for legitimate users, and require a significant amount of overhead for administrators.

For organizations that want to easily but significantly increase their authentication security, ThreatMetrix provides transparent multi-factor authentication that positively identifies users without requiring them to take additional and unnecessary steps to log in.

Frictionless Two-Factor Authentication

Most authentication systems evaluate passwords, or something the user knows.  ThreatMetrix adds Two-Factor Authentication  capabilities by verifying something the user has (one or more known specific devices), and something the user actually is (attributes identified in their Persona ID).

ThreatMetrix operates behind the scenes and is completely transparent to the end user. And because it does not require software, tokens, or biometric readers, it’s cost-effective and frictionless for both end users and administrators.

Complete Account Login Protection

ThreatMetrix protects your enterprise accounts from being hijacked, with powerful real-time capabilities that enable you to:

  • Use multi-factor authentication to positively identify who is attempting access
  • Discover suspicious patterns of login requests or unauthorized password sharing
  • Detect access attempts from unknown, risky, or compromised devices
  • Detect access attempts using user credentials that are known to have been compromised
  • Find logins coming from the wrong places, including devices connecting from known botnets or from behind hidden proxies or VPNs
  • Detect suspicious computer configurations, including oddly configured mobile devices or devices disguising their geo-location
  • Discover malware that has infiltrated a legitimate user’s device
  • Detect and prevent activity from bots, botnets and other scripted mechanisms
  • Detect account takeover attempts coming from mobile channels

One Platform Provides Comprehensive Context-based Authentication

ThreatMetrix is the only vendor that provides all of the data capture and analysis processes necessary to secure your applications in a single solution. The following vital procedures and capabilities are all included:

Profile Device and Identify Threats
ThreatMetrix profiles desktops, laptops, smartphones and tablets accessing your website, and identifies anomalies and malware threats that indicate a high-risk transaction.

Examine User Identity and Activity
ThreatMetrix analysis incorporates comprehensive details about online user identities and behaviors such as username and password, email address, associated devices and more into a dynamic Persona ID.

Configure Business Rules
ThreatMetrix offers an easily customizable policy engine that allows you to model business processes and incorporate your organization’s tolerance for risk.

Validate Business Policy
ThreatMetrix allows customers to constantly evaluate and verify risk scores, associated risks, and corresponding business policies.

Enable Detailed Analysis
ThreatMetrix provides visualizations and analytical reports enabling security and fraud analysts to understand the activity occurring on web applications, and giving them actionable information to improve security and reduce fraud.

Click here to learn more about ThreatMetrix’ patented technologies and how they can help you secure your applications.


Related Resources

Download the Data Sheet:
ThreatMetrix Context-Based Authentication
Download Now

Download the Whitepaper:
Context-Based Authentication
Download Now