Compare CA Advanced Authentication vs. CA Risk Authentication

CA Advanced Authentication is ranked 13th in Authentication Systems while CA Risk Authentication is ranked 25th in Authentication Systems. CA Advanced Authentication is rated 0, while CA Risk Authentication is rated 0. On the other hand, CA Advanced Authentication is most compared with RSA Authentication Manager, Symantec VIP and RSA Adaptive Authentication, whereas CA Risk Authentication is most compared with CA Advanced Authentication and RSA Adaptive Authentication.
Cancel
You must select at least 2 products to compare!
Ranking
13th
Views
906
Comparisons
386
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
25th
Views
228
Comparisons
164
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Find out what your peers are saying about Fortinet, Cisco, RSA and others in Authentication Systems. Updated: February 2020.
398,890 professionals have used our research since 2012.
Top Comparisons
Also Known As
CA Strong Authentication, CA Risk Authentication, Arcot WebFort, Arcot RiskFortCA RiskMinder
Learn
Broadcom
Broadcom
Overview

CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components:  CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure.  Together they enable an intelligent, layered security approach to protect user identities and organizational data.

Take the assessment


CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud. CA Risk Authentication can be used to reduce fraud and protect users from Internet attacks whether they are shopping online or accessing confidential or private information via a Web portal or application. It also provides organizations the ability to enforce different levels of authentication depending on the user activity, transaction value and the calculated risk score.

Offer
Learn more about CA Advanced Authentication
Learn more about CA Risk Authentication
Sample Customers
Global bank, Large Filipino Bank and SK InfosecGlobal bank based in the United States
Find out what your peers are saying about Fortinet, Cisco, RSA and others in Authentication Systems. Updated: February 2020.
398,890 professionals have used our research since 2012.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.