CA Risk Authentication Reviews

Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
it_user351696
Real User
Software Development Manager at a comms service provider with 1,001-5,000 employees
Jun 30 2017

What is most valuable?

The benefits are that it allows us to have real-time risk analysis on authentication traffic, so we can determine whether or not it's suspicious. How suspicious is it? If it's suspicious, we can enable step-up authentication and challenge for... more»

How has it helped my organization?

It gives us the ability to deny authentications for known malicious traffic. We have a webmail platform that people are constantly trying to hack into. Mostly, a large number of it comes from known bad IP addresses or unknown foreign... more»

What other advice do I have??

It works when you really need it to work, such as when you've got a denial-of-service attack, or some other attack when you need to be able to intelligently differentiate good traffic from bad traffic. That's when you start having performance... more»

Articles

User Assessments By Topic About CA Risk Authentication

Find out what your peers are saying about CA Technologies, RSA, Authentify and others in Authentication Systems.
291,767 professionals have used our research since 2012.

CA Risk Authentication Questions

CA Risk Authentication Projects By Members

CA Risk Authentication Consultants

What is CA Risk Authentication?

CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud. CA Risk Authentication can be used to reduce fraud and protect users from Internet attacks whether they are shopping online or accessing confidential or private information via a Web portal or application. It also provides organizations the ability to enforce different levels of authentication depending on the user activity, transaction value and the calculated risk score.

Also known as
CA RiskMinder
CA Risk Authentication customers

Global bank based in the United States

BUYER'S GUIDE
Not sure which Authentication Systems solution is right for you?

Download our free Authentication Systems Report and find out what your peers are saying about CA Technologies, RSA, Authentify, and more!

Sign Up with Email