AXN Manage is a robust risk engine and MFA service to help build a zero trust policy for your existing authentication process.

AXN Manage is a robust risk engine and MFA service to help build a zero trust policy for your existing authentication process.

Risk-based authentication is a pillar of Zero Trust, AXN Manage offers passive risk profiling, device and user risk is analyzed and PII is verified in the background during the authentication process. AXN Manage provides feedback to the Identity Provider (IdP) with a policy decision based on various defined risk conditions. These policies can be customized to each application or use case to build the perfect security posture for each application.

Adaptive Authentication

Adaptive Authentication

A robust risk engine that returns device and user risk decisions to build a zero-trust policy for your existing login process (for consumers, 3rd Parties, or employees). AXN Manage combines device risk with PII validation to provide continuous risk analysis to stop account takeover (ATO) fraud.

AXN Manage checks for:
  • Device Risk
  • Network Risk
  • Location Risk
  • User Behavior Risk
  • Global Fraud Consortium Risk
  • Attribute Verification
Fasttap MFA

Fasttap MFA

If a user/device is deemed risky ID Dataweb also provides multi-factor authentication with FastTap MFA. FastTap MFA is a great complement to AXN Manage as it takes the risk policy decision and performs MFA with either a link or OTP sent to the phone on record. Using the link can provide risk factors on the phone such as whether it has been ported or SIM swapped or even if it is near the authenticating device. This is an easy hurdle for good actors but the bad actors are stopped as they do not not have access to the user’s actual device.

FastTap MFA provides:
  • Device, location, network, behavior risk analysis
  • Proximity check (protect against phishing attacks)
  • TOR / High-risk VPN detection
  • BOT detection
  • Device fingerprinting (remember device)

Risk-based authentication is a pillar of zero trust.

By providing passive risk profiling on the user, device, and PII in the background during the authentication process, your legitimate users are not even aware.

Risk Based Authentication

SUPPORTS THIRD PARTY FEDERATED LOGIN WITH CONTINUOUS RISK ANALYSIS, ATTRIBUTE VERIFICATION AND ADAPTIVE MFA

First Factor Authentication

User authenticates at their company’s login page

Passive Authentication

Before being granted access to your organization, environmental risk is analyzed, and Pl is verified

Conditional Second Factor Authentication

  • Challenge user with MFA based on unknown device or risk
  • Block clear attempts at fraud directly
Risk Based Authentication

Here to answer your questions.

Contact Us