User Transparent Adaptive
Compliance & Big Data
DEEP DEVICE FORENSICS
Hundreds of factors and anonymous digital fingerprints are evaluated for every transaction. Factors change over time and variances are evaluated based on both levels of risk and time.
Network forensics are evaluated constantly. Transactions are scrutinized and evaluated for MITM attacks, session hijacking, and allowed connections on a per transaction basis.
Patterns of Behavior are updated continuously. Various combinations of user behavior (where they access services, how they access services, what technologies they choose to use, what services they connect to & what types of transactions they execute) are evaluated on every transaction.
Multiple algorithms verify user locations and map those locations to approved companies, organizations, applications, and even specific transactions within applications. Location supports both real-world geographic coordinates as well as private inter-organizational coordinates.
USER & SERVICES RISKS
Risk associated with a transaction may depend on many factors. There may be one risk level associated with a user logging into an application, and different risks for post-login transactions. aPersona enables any number of transaction risk profiles to be created and utilzed by any transaction for any user within any application.
INTERNET OF THINGS
aPersona is built for the future and allows new and exciting factors like IoT to become part of any transaction validation.As the Internet of Things begins to take shape, there is an enormous amount of behavior activity that surrounds the availability and the proximity of Internet enabled things.
COMPLIANCE & BIG DATA
Gather risk analytic data for all your transactions. Use the information for Big Data Risk Analytics and for Compliance Reporting.
Monitor all transactions in real time with forensic data and risk analytics.
Users hate being inconvenienced. aPersona's adaptive technology provides the lowest user friction and increased security assurance at the same time.
Optionally elect to share and/or validate transactions across different applications, organizations or even different companies.
Purpose-built for Service Providers and Cloud Providers to resell. Enterprises can use multi-tenants for different organizations, testing or any other needs.
Simple integration web service API's make integration a snap!
Whitelist, Blacklist and Block Access to your applications by country. Override Blacklisted countries by user for a period of time when needed to support global travel use cases.
ACTIVE THREAT ACTOR FILTERING
Active Threat Actor data is updated every 15 minutes from hundreds of threat sources across 8 different categories of threat data including: Spam, Bad Reputation, Threat Organizations, Malware, Attacks, & Abuse.