We are proud to announce that Forrester named IBM a Strong Performer in its new report, “The Forrester Wave: Risk-Based Authentication, Q3 2017.” This is the first update to the Forrester Wave for Risk-Based Authentication (RBA) since Q1 2012, and IBM’s first time participating in the report as one of the eight most “significant providers.”

Only one vendor was ranked as a Leader in the report, and IBM is one of three vendors to earn a Strong Performer placement. IBM earned the highest scores possible in the “future overall market and development plans for RBA and technology” and “solution implementation strength” criteria.

DOWNLOAD THE FORRESTER WAVE FOR Risk-Based Authentication

How Vendors Were Evaluated

Forrester updated this Wave in response to new innovations in RBA, such as the introduction of machine learning algorithms, increased usage of two-factor authentication with biometric and behavioral authentication, and the widespread use of flexible cloud deployment models.

Forrester noted in the report that account-based takeover is on the rise, causing at least $6.5 billion to $7 billion in annual losses across financial services, insurance, e-commerce, health care, gaming and gambling, and other industries.

Forrester used a combination of vendor surveys, product demos, customer reference calls and unsupervised demonstration environment usage to evaluate vendors for this Wave.

The eight vendors selected for evaluation met the following criteria, according to Forrester:

  • A thought-leading RBA portfolio of products and services;
  • Total RBA revenues of at least $10 million with at least 10 percent growth;
  • At least 60 paying RBA customer organizations in production;
  • An unaided mindshare within Forrester’s end user customers; and
  • An unaided mindshare within Forrester’s vendor customers.

DOWNLOAD THE FORRESTER WAVE FOR Risk-Based Authentication

A Holistic Approach to Risk-Based Authentication

We believe the essential problem of fraud starts with the identity chain. We also think the traditional three types of authentication factors — something you know, something you have and something you are — must be combined with intelligent assessment of the specific risk of a user. Risk is determined by the user’s behavior and the context of their interaction (e.g., device, location, pattern of activity, etc.). Risk-based authentication means that high-risk users are challenged more frequently for authentication factors, while low-risk users get things done with minimal interruption.

Risk-based authentication requires a holistic approach to fraud and digital identity that incorporates positive identity corroboration with identity analytics to establish a deeper understanding of the user. This approach should also apply risk scoring to better mitigate the risks of fraud. IBM’s RBA offering integrates IBM Security Access Manager and Trusteer Pinpoint Detect to help block fraudulent activities and high-risk transactions while maintaining an excellent user experience.

DOWNLOAD THE FORRESTER WAVE FOR Risk-Based Authentication

The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

More from Identity & Access

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today