Better authentication decisions with a cloud-based service
Get the Datasheet Free Trial
PingOne Risk is an easy-to-implement cloud service that helps your organization make smarter authentication decisions using machine learning and analytics to detect malicious activity. By analyzing multiple risk signals, PingOne Risk can identify anomalous activity to block attacks or require strong authentication methods, providing a greater level of assurance of your users’ identities.
Detect Risk with Intelligence
Bad actors usually don’t sign on like legitimate users. Recognizing abnormal user behavior can help your organization detect malicious activity, but this requires analyzing vast amounts of authentication data to learn behavior patterns. Using machine learning and artificial intelligence, PingOne Risk analyzes multiple signals in real-time to distinguish between normal and abnormal behavior across your enterprise’s users, so you can implement new intelligent authentication policies.
Read the BlogMake Better Authentication Decisions
Evaluating risk signals enables your organization to gain in-depth user behavior insights and make better authentication decisions. This data can help you understand the level of risk associated with a user, so you can apply the right authentication methods that balance security and convenience. PingOne Risk works with a variety of Ping and third-party products, so you can determine if a user can access a resource, needs step-up authentication or is denied access.
Get the White PaperEvaluate Risk Signals to Detect Malicious Activity
User and entity behavior analytics (UEBA) takes advantage of machine-learning models to detect abnormalities in authentication behavior. Using UEBA in PingOne Risk allows your organization to look at many different data points, including device type, operating system, browser version, date and time, to determine if this behavior is anomalous for a user in your organization.
Bad actors often use anonymous networks such as unknown VPNs, TOR and proxies to mask their IP addresses to gain access to resources. With PingOne Risk, your organization can analyze user IP addresses and determine if the address is from an anonymous network and if step-authentication is required.
Bad actors can reuse IP addresses multiple times to execute DDoS attacks or engage in spamming activity. A user attempting to access resources from an IP address that’s connected to previous suspicious activity indicates a higher probability of risk. PingOne Risk analyzes the IP address of the user to determine any involvement in malicious activity.
It’s not uncommon for users to sign on to systems from multiple locations during the day. However, it could be a strong indication of suspicious activity if the time between signing on from different locations is logistically impossible. With PingOne Risk, your organization can analyze the location data of where users sign on to determine if the time lapse between sign-on locations is possible.
Increase Security By Aggregating Risk Models
Strengthen your authentication decisions by aggregating the results of multiple risk predictors into one policy to better secure your organization. PingOne Risk allows you to easily configure intelligence-based policies to meet your organization’s needs by allowing administrators to assign different weights to each risk predictor and combining the results to calculate a single risk score. Administrators can create different risk policies that can be used for different use cases, depending on business needs. Your organization can optimize the thresholds for low, medium and high risk scores in the policy to ensure only the right users get access to resources.
Secure Authentications with Deep Insights
Understanding where risk is inside your organization can help you make the right authentication decisions to increase your security posture. Use the dashboards provided with PingOne Risk to gain deep insights, such as what and where are the most common risk factors in an organization, into authentication patterns, and access reports on high-risk activities help investigate potential threats.
Download the PingOne Risk datasheet or contact us to learn more
Start Today
See how Ping can help you deliver secure employee and customer experiences in a rapidly evolving digital world.
Request a free demo
Thank you! Keep an eye on your inbox. We’ll be in touch soon.