aPersona Adaptive Security Manager

aPersona’s Adaptive Security Manager runs on-premise or in the cloud. Most customers run aPersona ASM on-premise or in their own cloud infrastructure, but some companies opt to have aPersona host it (Login Here).

aPersona ASM can be installed on Linux or Windows. Please fill in a contact-us form to request access to the installation files and to request pricing.

To integrate your service or application to enable adaptive MFA, refer to the aPersona ASM API Documentation.

DEEP DEVICE FORENSICS

Hundreds of factors and anonymous digital fingerprints are evaluated for every transaction. Factors change over time and variances are evaluated based on both levels of risk and time.

BEHAVIORAL LEARNING

Patterns of Behavior are updated continuously. Various combinations of user behavior (where they access services, how they access services, what technologies they choose to use, what services they connect to & what types of transactions they execute) are evaluated on every transaction.

USER & SERVICES RISKS

Risk associated with a transaction may depend on many factors. There may be one risk level associated with a user logging into an application, and different risks for post-login transactions. aPersona enables any number of transaction risk profiles to be created and utilized by any transaction for any user within any application.

COMPLIANCE & BIG DATA

Gather risk analytic data for all your transactions. Use the information for Big Data Risk Analytics and for Compliance Reporting.

FRICTIONLESS

Users hate being inconvenienced. aPersona's adaptive technology provides the lowest user friction and increased security assurance at the same time.

MULTI-TENANT

Purpose-built for Service Providers and Cloud Providers to resell. Enterprises can use multi-tenants for different organizations, testing or any other needs.

COUNTRY FILTERING

Whitelist, Blacklist and Block Access to your applications by country. Override Blacklisted countries by user for a period of time when needed to support global travel use cases.

NETWORK FORENSICS

Network forensics are evaluated constantly. Transactions are scrutinized and evaluated for attacks, session hijacking, and allowed connections on a per transaction basis.

LOCATION

Multiple algorithms verify user locations and map those locations to approved companies, organizations, applications, and even specific transactions within applications. Location supports both real-world geographic coordinates as well as private inter-organizational coordinates.

INTERNET OF THINGS

aPersona is built for the future and allows factors like IoT to become part of any transaction validation. As the Internet of Things begins to take shape, there is an enormous amount of behavior activity that surrounds the availability and the proximity of Internet enabled things.

MONITORING

Monitor all transactions in real time with forensic data and risk analytics.

CROSS DOMAINS

Optionally elect to share and/or validate transactions across different applications, organizations or even different companies.

APIs

Simple integration web service API's make integration a snap!

REAL-TIME ACTIVE THREAT ACTOR MONITORING

Failed transaction velocities are constantly monitored. Active Threat Actor data is updated every 15 minutes from hundreds of threat sources across 8 different categories of threat data including: Spam, Bad Reputation, Threat Organizations, Malware, Attacks, & Abuse.