CA Risk Authentication [EOL] vs RSA Adaptive Authentication comparison

Cancel
You must select at least 2 products to compare!
Executive Summary

We performed a comparison between CA Risk Authentication [EOL] and RSA Adaptive Authentication based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
  • "Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
  • "Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
  • "The pricing is $50 per head, yearly."
  • More RSA Adaptive Authentication Pricing and Cost Advice →

    Ranking
    Unranked
    In Authentication Systems
    25th
    Views
    327
    Comparisons
    272
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Buyer's Guide
    Authentication Systems
    March 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: March 2024.
    765,386 professionals have used our research since 2012.
    Comparisons
    Also Known As
    CA RiskMinder
    Learn More
    Overview

    CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud. CA Risk Authentication can be used to reduce fraud and protect users from Internet attacks whether they are shopping online or accessing confidential or private information via a Web portal or application. It also provides organizations the ability to enforce different levels of authentication depending on the user activity, transaction value and the calculated risk score.

    RSA Adaptive Authentication is a risk-based two-factor authentication solution providing cost-effective protection for an entire user base. Adaptive Authentication secures online portals, SSL VPNs, and web access management portals for different types of organizations in the healthcare, insurance, enterprise, government, financial services, and other industries. Based on the transparent two-factor authentication technology, Adaptive Authentication works behind the scenes to authenticate end users and transactions based on individual end user and device profiles. In addition, Adaptive Authentication uses the RSA Risk Engine to estimate the level of risk for the specific activity and uses information collected from the RSAeFraudNetwork (a cross-organization, cross-application, cross-border online fraud network) to identify fraudulent activities. The Policy Manager determines what actions must be performed, depending on the risk score and other parameters.
    Sample Customers
    Global bank based in the United States
    ADP, Ameritas, Partners Healthcare
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Financial Services Firm45%
    Computer Software Company13%
    Insurance Company5%
    Healthcare Company5%
    Company Size
    No Data Available
    REVIEWERS
    Midsize Enterprise14%
    Large Enterprise86%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise7%
    Large Enterprise77%
    Buyer's Guide
    Authentication Systems
    March 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: March 2024.
    765,386 professionals have used our research since 2012.

    CA Risk Authentication [EOL] doesn't meet the minimum requirements to be ranked in Authentication Systems while RSA Adaptive Authentication is ranked 25th in Authentication Systems. CA Risk Authentication [EOL] is rated 7.0, while RSA Adaptive Authentication is rated 6.8. The top reviewer of CA Risk Authentication [EOL] writes "If we spot anomalies we can step up authentication. The policy entrance should learn from that state rather than reverting back to what it believes is the static good". On the other hand, the top reviewer of RSA Adaptive Authentication writes "It stops fraud in banks and reduces their costs". CA Risk Authentication [EOL] is most compared with , whereas RSA Adaptive Authentication is most compared with RSA Authentication Manager, ThreatMetrix, Fortinet FortiAuthenticator and IBM Trusteer.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.