Risk-based authentication software(RBA), sometimes called adaptive authentication, is an emerging identity and access technology. It uses a range of factors from the user — their behavior, devices they’re using and other variables — to determine whether this user is potentially dangerous.
What does an RBA system do?
When a person attempts to access an application, database or any other secure resource, an RBA system will evaluate their credentials. If the user does not meet certain standards, they will be prompted to submit additional verification such as an SMS code, biometric factors or a security question answer. Any number of these may be required, depending on the administrator’s settings and the user’s threat level.
The diagram below shows how risk-based authentication works.
These tools are becoming increasingly important as a result ofbring-your-own-device (BYOD)practices. Each new endpoint is a potential risk. Those risks increase exponentially with the emergence of theinternet of things(IoT). There have already been a handful ofincidents in the pastwhere IoT endpoints have been compromised by malware and used in DDoS attacks, or used for simple pranks by hackers. RBA could help limit a hacker’s ability to inject malware or take over a device by restricting their access immediately.
RBA has also grown in importance with the boom of cloud services such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) applications. These are often used remotely and accessed via internet connections, but many connections are not secure. If someone tries to access a cloud application on an unsecure network, the RBA tool could trigger additional credential requirements or simply not allow access as a security risk.
Since more than2.2 billion records were stolen in 2017, companies are frantically working on ways to better secure their data. RBA and behavioral analytics will help companies prevent external threats and identify internal parties that may be the source of leaks. Behavioral analytics will become complementary components to RBA in tracking user activity and identifying flaws in earlier practices.
Ideally, these practices will improve identity security and protect both corporate and individual data from potentially devastating identity theft repercussions. While machine learning can help security solutions better identify new threats and malware, it will also benefit access and authentication. Risk-based protocols are going to be the easiest and most effective way to integrateartificial intelligence(AI) technology with identity security solutions.
The pioneers of risk-based authentication
RSA, a security solutions company, has been innovative in implementing RBA features to standard products. It has already established itself in the identity and access security market, and were one of the first public-key cryptosystems. It has a pure-play RBA product calledRSA Adaptive Authentication, in addition to an upgradedSecurIDoffering with risk-based authentication capabilities. This year it offered a new integration with the popularMicrosoft Active Directory, and extended itsBusiness-Driven Security™to help comply with European Union GDPR regulations.
Aside from the long-time leaders in the market, new companies are gaining recognition for their RBA solutions. Companies such asCallsignandUnifyIDreceived significant funding in 2017. Callsign pulled a whopping $35 million inSeries Afunding from Accel Partners, bringing its total to $38,750,000. UnifyID held itsfirst funding roundand gained $20 million from New Enterprise Associates.
Callsign has both consumer and business solutions for web, mobile and application security. The consumer product can be used via cloud, hybrid and for original equipment manufacturer (OEM) offerings. It also includes a mobile software development kit (SDK) for Android and iOS to allow developers to embed callsign security features in any app. The business version is geared towards larger networks, SaaS applications and endpoints. It’s scalable and can provide VPN and virtual machine coverage.
UnifyID defines adaptive authentication as “implicit authentication” to include undervalued factors such as keystroke timing, mouse movements and Wi-Fi telemetry. Vendors like these rarely advertise all the factors utilized to limit a hacker’s ability to game the system, but UnifyID claims to include more 100 factors. It specifically cites machine learning for IoT devices too. Products like this could, for the most part, eliminate a user’s need to remember or frequently update passwords.
More emerging companies like these will get big funding rounds in 2018, but many existing companies will likely just add the functionality to long-standing products. It may come as an additional module or up-charged feature, but the effectiveness of RBA is already being touted, motivating whoever hasn’t already added the capability to catch up.
The future of risk-based authentication in business
IoT will probably see the greatest long-term impact from RBA. It could ensure healthcare devices are only controlled by parties on the hospital’s secure network. Or it could make sure a fleet of smart cars can’t be controlled by anyone but an administrator’s single device. Continuous and adaptive security protocols could make these easier to manage for administrators and easier to access for end-users.
RBA features will continue to be added tocloud identity and access management software(CIAM) andsingle sign-ontools because it makes life easier for users while simultaneously improving data security. These tools can easily add factors that identify potentially risky parties from accessing information, and many already do. Utilizing machine learning to quickly compile risk ratings is a little more difficult, but still feasible for in-house development teams or teams that just integrate an RBA tool’s AP,I or provide an SDK like UnifyID.
Like Callsign, many RBA tools will be used to restrict access for cloud applications and other SaaS tools. Something like a cloud access security broker (CASB) with RBA would provide a simple centralized console for users.Symantec’s Cloud SOCalreadyintegrateswith its identity management solutions, and facilitates RBA for access to applications likeSalesforce CRM, Microsoft 365, and Amazon Web Services. More CASB tools will adopt or integrate with RBA tools in the near future, and help close the security hole between endpoints and cloud-based tools.
Password managerswill likely either evolve into RBA solutions or simply fade out of the spotlight. Password trends have already changed, exemplified by thenew password guidelinesset by the The National Institute of Standards and Technology (NIST) in 2017. Many existing practices are archaic and overly simplistic. Companies needmulti-factor authentication softwareto ensure their data is safe. Passwords alone may still exist for things like social media sites and mobile apps, but many of those already offer two-factor authentication as an additional feature in their privacy settings.
The two companies already mentioned have set the stage for an emerging market. Their significant funding figures already point to a valuable market. The identity and access management market is expected to boom from $8 billion in 2016 to $14.82 billion in 2021. A significant portion of the market by then will be held by providers of RBA-based solutions.
Companies use dozens of cloud applications, and it’s not always easy to remember all the passwords, let alone govern hundreds of users. Centralized access providers for cloud apps will become heavy players in the RBA field. It reduces administrative burdens of setting access for specific users, riding old accounts and requiring complex password requirements. Plus, users save time and sweat trying to remember and store passwords for their dozens of applications.
Retinal scans and fingerprint scanners used to be the makings of a Philip K. Dick novel. But today everyday devices, such as your iPhone, have fingerprint or face scanners. When RBA triggers doubt a user’s identity, biometric analyses are reliable sources for a second or third factors for authentication.
Fraud prevention is of large concern for e-commerce providers and retailers. It’s not uncommon for identity thieves to utilizee-commerce platformsto spend another individual’s cash. A bank might pick up on it, but only if the transaction goes through. E-commerce providers could monitor historical customer activity and identify potentially fraudulent transactions before they’re processed.
Risk-based authentication tools have sustained a significant portion of the identity management technology discussion. As more incidents similar to theEquifaxandYahoodata breaches take place, companies continue to invest in tools that help limit identity and access management failures. Risk-based authentication (RBA) is the logical next step to manage user information and data security in real time. Providers will continue to offer new embedded authentication tools and utilize machine learning to optimize RBA effectiveness. It’s not the end-all, be-all solution for identity and access management, but it’s a step forward for protecting the everyday citizen’s sensitive information.
Aaron has been researching security, cloud, and emerging technologies with G2 for more than half a decade. Over that time he's outlined, defined, and maintained a large portion of G2's taxonomy related to cybersecurity, infrastructure, development, and IT management markets. Aaron utilizes his relationships with vendors, subject-matter expertise, and familiarity with G2 data to help buyers and businesses better understand emerging challenges, solutions, and technologies. In his free time, Aaron enjoys photography, design, Chicago sports and lizards.
Risk-Based Authentication: The Future of Workplace SecurityRisk-based authentication (RBA), sometimes called adaptive authentication, is an emerging identity and access technology. It uses a range of factors from the user, their behavior, devices they’re using and other variables to determine whether this user is potentially dangerous.https://learn.g2.com/trends/risk-based-authenticationhttps://learn.g2crowd.com/hubfs/Screen%20Shot%202019-05-13%20at%201.35.29%20PM.png2018-01-18 16:20:00Z
Aaron WalkerAaron has been researching security, cloud, and emerging technologies with G2 for more than half a decade. Over that time he's outlined, defined, and maintained a large portion of G2's taxonomy related to cybersecurity, infrastructure, development, and IT management markets. Aaron utilizes his relationships with vendors, subject-matter expertise, and familiarity with G2 data to help buyers and businesses better understand emerging challenges, solutions, and technologies. In his free time, Aaron enjoys photography, design, Chicago sports and lizards.https://learn.g2.com/author/aaron-walkerhttps://learn.g2.com/hubfs/_Logos/Aaron%20WalkerUpdated.jpeghttps://www.linkedin.com/in/aaron-montemayor-walker/
Never miss a post.
Subscribe to keep your fingers on the tech pulse.
By submitting this form, you are agreeing to receive marketing communications from G2.