CA Risk Authentication Reviews

Filter by:Reset all filters
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Real User
Software Development Manager at a comms service provider with 1,001-5,000 employees
Jun 30 2017

What is most valuable?

The benefits are that it allows us to have real-time risk analysis on authentication traffic, so we can determine whether or not it's suspicious. How suspicious is it? If it's suspicious, we can enable step-up authentication and challenge for… more»

How has it helped my organization?

It gives us the ability to deny authentications for known malicious traffic. We have a webmail platform that people are constantly trying to hack into. Mostly, a large number of it comes from known bad IP addresses or unknown foreign countries… more»

What other advice do I have?

It works when you really need it to work, such as when you've got a denial-of-service attack, or some other attack when you need to be able to intelligently differentiate good traffic from bad traffic. That's when you start having performance… more»


User Assessments By Topic About CA Risk Authentication

Find out what your peers are saying about CA Technologies, RSA, Symantec and others in Authentication Systems. Updated: April 2019.
341,056 professionals have used our research since 2012.

CA Risk Authentication Questions

CA Risk Authentication Projects By Members

What is CA Risk Authentication?

CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud. CA Risk Authentication can be used to reduce fraud and protect users from Internet attacks whether they are shopping online or accessing confidential or private information via a Web portal or application. It also provides organizations the ability to enforce different levels of authentication depending on the user activity, transaction value and the calculated risk score.

Also known as
CA RiskMinder
CA Risk Authentication customers

Global bank based in the United States

Download our free Authentication Systems Report and find out what your peers are saying about CA Technologies, RSA, Symantec, and more!

Sign Up with Email