We are proud to announce that Forrester named IBM a Strong Performer in its new report, “The Forrester Wave: Risk-Based Authentication, Q3 2017.” This is the first update to the Forrester Wave for Risk-Based Authentication (RBA) since Q1 2012, and IBM’s first time participating in the report as one of the eight most “significant providers.”
Only one vendor was ranked as a Leader in the report, and IBM is one of three vendors to earn a Strong Performer placement. IBM earned the highest scores possible in the “future overall market and development plans for RBA and technology” and “solution implementation strength” criteria.
DOWNLOAD THE FORRESTER WAVE FOR Risk-Based Authentication
How Vendors Were Evaluated
Forrester updated this Wave in response to new innovations in RBA, such as the introduction of machine learning algorithms, increased usage of two-factor authentication with biometric and behavioral authentication, and the widespread use of flexible cloud deployment models.
Forrester noted in the report that account-based takeover is on the rise, causing at least $6.5 billion to $7 billion in annual losses across financial services, insurance, e-commerce, health care, gaming and gambling, and other industries.
Forrester used a combination of vendor surveys, product demos, customer reference calls and unsupervised demonstration environment usage to evaluate vendors for this Wave.
The eight vendors selected for evaluation met the following criteria, according to Forrester:
- A thought-leading RBA portfolio of products and services;
- Total RBA revenues of at least $10 million with at least 10 percent growth;
- At least 60 paying RBA customer organizations in production;
- An unaided mindshare within Forrester’s end user customers; and
- An unaided mindshare within Forrester’s vendor customers.
DOWNLOAD THE FORRESTER WAVE FOR Risk-Based Authentication
A Holistic Approach to Risk-Based Authentication
We believe the essential problem of fraud starts with the identity chain. We also think the traditional three types of authentication factors — something you know, something you have and something you are — must be combined with intelligent assessment of the specific risk of a user. Risk is determined by the user’s behavior and the context of their interaction (e.g., device, location, pattern of activity, etc.). Risk-based authentication means that high-risk users are challenged more frequently for authentication factors, while low-risk users get things done with minimal interruption.
Risk-based authentication requires a holistic approach to fraud and digital identity that incorporates positive identity corroboration with identity analytics to establish a deeper understanding of the user. This approach should also apply risk scoring to better mitigate the risks of fraud. IBM’s RBA offering integrates IBM Security Access Manager and Trusteer Pinpoint Detect to help block fraudulent activities and high-risk transactions while maintaining an excellent user experience.
DOWNLOAD THE FORRESTER WAVE FOR Risk-Based Authentication
The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
Product Marketing Manager, Access and Authentication, IBM