About the Author: ProofID

ProofID

Share

TOPICS

Categories: Blog, Events, Ping Identity

Here is what happens behind the scenes:

  • At the point of sign-on, ThreatMetrix – in real time – analyzes the connecting device, associated online personas, transaction context and past behavior
  • This resulting analysis is used by a global policy engine that lets businesses define appropriate risk and trust levels to determine access
  • Based on achieving a predefined level of trust, users are granted access through Ping Identity’s PingFederate product to all their associated applications and online resources
  • If the predefined level of trust fails, such as an illegitimate device or unknown network connection previously not utilized, the user is presented with a friction based step up authentication, such SMS text messaging with an authorization code, or answering security questions. Upon successful step up authentication, the user will be granted access to all their associated applications and online resources.

ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

PEGRight is a Security Systems Integrator with proven IAM deployment expertise in complex IT environments. Identity and Access Management services include strategic consulting, professional services, integration services and custom development. PEGRight, a Ping Identity Platinum Services Partner, provided custom development services producing the integration between ThreatMetrix and PingFederate. In addition, PEGRight provides integration services for the combined solution.

Be the first to hear about news, product updates, and innovation from proofid