Skip to main content
Adaptive Authentication

Adaptive Authentication

CYBERSECURITY DICTIONARY

Adaptive Authentication

Adaptive Authentication is a method for selecting the right authentication factors depending on a user's risk profile and tendencies - it adapts the authentication type to each situation.

This is a new approach to authentication that adds additional security while minimizing the intrusiveness of the process on users. There are two key components: Threat and risk checks and Multi-factor Authentication (MFA). Risk checks are performed in the background without user awareness. MFA takes place only if a risk is detected. For example, during a login attempt a risk check may look at the reputation of the network a user is on, the geographic location of the source or device characteristics. If an anomaly is detected, MFA kicks in to help authenticate the login attempt.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

April 26, 2018

Employees’ Contribution to Breach of Trust

General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In r...

See Details

October 03, 2017

Online Safety - Simple Steps

From cyber bullying to obtaining personal and sensitive information through phishing campaigns, harm lurks in many corners of the Internet. With a few...

See Details

September 23, 2014

Busting Password Managers

As you may have noticed, web browser password managers have begun to take over. Until recently, a developer could simply add the "AutoComplete=off" at...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.