Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Safeguard against account takeovers, fraudulent new accounts, and multifactor authentication fatigue with the capabilities of PingOne Protect. This solution assesses various attack vectors, assigns risk ratings, and offers valuable insights, enabling the activation of mitigation tools that thwart potential threats while ensuring that genuine users can authenticate without difficulty. By leveraging intelligence-driven policies, PingOne Protect amalgamates the outcomes of diverse risk indicators to derive a comprehensive risk score. This score is linked to specific policies that dictate the level of friction applied during user interactions, which may include techniques like CAPTCHA, password resets, selfie verifications, and push notifications. Enhance the effectiveness of each predictor, consolidate the predictors, integrate signals from external sources, and implement overrides as necessary. The predictors encompass bot detection, IP velocity, user velocity, anomalous velocity, user location discrepancies, IP reputation, usage of anonymous networks, risk behaviors of users, models of user-based risk, detection of new devices, identification of suspicious devices, and custom or third-party predictors, thereby providing a robust solution to manage risks effectively. By utilizing these comprehensive measures, organizations can significantly bolster their defenses against various forms of cyber threats.

Description

Enhance security and drive growth through Symantec's Advanced Authentication solutions. Our technology offers real-time safeguarding for both online and mobile platforms. With our innovative approach, we can seamlessly verify the identity of employees, partners, or contractors while ensuring a smooth login process. This capability allows legitimate users to access their accounts anytime and anywhere, fostering trust and loyalty to your brand. Enjoy a versatile and scalable system that incorporates robust multi-factor authentication alongside risk-based techniques such as device recognition, geolocation, and monitoring of user actions. As catastrophic cyber incidents occur daily, we equip you to protect your organization effectively. By delivering an effortless and intuitive experience for your customers, you can cultivate their trust and commitment. Furthermore, leveraging accurate data empowers you to better differentiate between genuine interactions and fraudulent activities, bolstering your overall security measures.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AT&T Alien Labs Open Threat Exchange
Abstract Security
Airlock
Alliance Key Manager
AuthControl Sentry
BeyondCorp Enterprise
CA Auditor for z/OS
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Cyware
Delinea Cloud Access Controller
EV Observe
Elevate Security
Keystone Accounting
Optiv Managed XDR
SSLTrust
ThreatAware
Trustwave DbProtect
iTalent

Integrations

AT&T Alien Labs Open Threat Exchange
Abstract Security
Airlock
Alliance Key Manager
AuthControl Sentry
BeyondCorp Enterprise
CA Auditor for z/OS
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Cyware
Delinea Cloud Access Controller
EV Observe
Elevate Security
Keystone Accounting
Optiv Managed XDR
SSLTrust
ThreatAware
Trustwave DbProtect
iTalent

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Ping Identity

Founded

2002

Country

United States

Website

www.pingidentity.com/en/platform/capabilities/threat-protection/pingone-protect.html

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.broadcom.com/info/authentication

Product Features

Fraud Detection

Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval

Product Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Alternatives

Alternatives

Comodo MDR Reviews

Comodo MDR

Comodo
Secfense Reviews

Secfense

Secfense