aPersona Adaptive Security Manager
aPersona’s Adaptive Security Manager runs on-premise or in the cloud. Most customers run aPersona ASM on-premise or in their own cloud infrastructure, but some companies opt to have aPersona host it.
aPersona ASM can be installed on Linux or Windows. Please fill in a contact-us form to request access to the installation files and to request pricing.
DEEP DEVICE FORENSICS
Hundreds of factors and anonymous digital fingerprints are evaluated for every transaction. Factors change over time and variances are evaluated based on both levels of risk and time.
BEHAVIORAL LEARNING
Patterns of Behavior are updated continuously. Various combinations of user behavior (where they access services, how they access services, what technologies they choose to use, what services they connect to & what types of transactions they execute) are evaluated on every transaction.
USER & SERVICES RISKS
Risk associated with a transaction may depend on many factors. There may be one risk level associated with a user logging into an application, and different risks for post-login transactions. aPersona enables any number of transaction risk profiles to be created and utilized by any transaction for any user within any application.
COMPLIANCE & BIG DATA
Gather risk analytic data for all your transactions. Use the information for Big Data Risk Analytics and for Compliance Reporting.
FRICTIONLESS
Users hate being inconvenienced. aPersona's adaptive technology provides the lowest user friction and increased security assurance at the same time.
MULTI-TENANT
Purpose-built for Service Providers and Cloud Providers to resell. Enterprises can use multi-tenants for different organizations, testing or any other needs.
COUNTRY FILTERING
Whitelist, Blacklist and Block Access to your applications by country. Override Blacklisted countries by user for a period of time when needed to support global travel use cases.
NETWORK FORENSICS
Network forensics are evaluated constantly. Transactions are scrutinized and evaluated for attacks, session hijacking, and allowed connections on a per transaction basis.
LOCATION
Multiple algorithms verify user locations and map those locations to approved companies, organizations, applications, and even specific transactions within applications. Location supports both real-world geographic coordinates as well as private inter-organizational coordinates.
INTERNET OF THINGS
aPersona is built for the future and allows factors like IoT to become part of any transaction validation. As the Internet of Things begins to take shape, there is an enormous amount of behavior activity that surrounds the availability and the proximity of Internet enabled things.
MONITORING
Monitor all transactions in real time with forensic data and risk analytics.
CROSS DOMAINS
Optionally elect to share and/or validate transactions across different applications, organizations or even different companies.
APIs
Simple integration web service API's make integration a snap!
REAL-TIME ACTIVE THREAT ACTOR MONITORING
Failed transaction velocities are constantly monitored. Active Threat Actor data is updated every 15 minutes from hundreds of threat sources across 8 different categories of threat data including: Spam, Bad Reputation, Threat Organizations, Malware, Attacks, & Abuse.