ISX Enterprise Authentication helps organizations unify and simplify their authentication strategies. As the number of security breaches and attacks continue to increase, so does the level of sophistication. Organizations must adapt to these rising threats by implementing secure and adaptive authentication tactics while simplifying daily operations for their user base. Our Enterprise Directory, Strong (Multi-Factor) Authentication, and Contextual Authentication solutions provide businesses with clear and actionable methods to streamline their processes.

Enterprise Directory

The Enterprise Directory service provides a centralized repository of identity data, including biographic, demographic, and role and membership-related attributes for all types of user data. ISX Enterprise Directory helps organizations consolidate and virtualize stored user data into a focused view to support simplified and streamlined authentication, authorization, and personalization for application teams to leverage.

Strong (Multi-Factor) Authentication

Strong Authentication is an advanced authentication solution for securing an organization’s assets. By requiring users to provide multiple proofs of their identity before being granted access to a set of resources, ISX’s multi-factor authentication process fundamentally eliminates risk of stolen passwords. These enhanced proofs may use the following MFA mechanisms:

  • Hard Tokens
  • Soft Tokens
  • Biometric
Contextual Authentication

Contextual Authentication is the process by which a user’s context are interrogated to determine if the user is in fact who they say they are and if they are taking appropriate actions at an appropriate time. Every time a user interacts with an authentication server, in addition to any explicit credentials they present, they, or their devices, implicitly exhibit several different signals. ISX Contextual Authentication collects the following information during the authentication process:

  • Where is the user authenticating from, in terms of geographical location?
  • Is the user authenticating from a known device?
  • What is the user trying to do?
  • Is this action consistent with what the user normally does and when they normally do it?

With Contextual Authentication, this set of factors around a user’s login are considered and assessed to determine whether or not the person is who they say they are. If there’s a chance they are not, then an appropriate action is taken.

ISXEnterprise Authentication