Silverfort’s Risk Engine secures corporate identities without impacting usability
Silverfort launched AI-based risk engine that analyzes activities across all on-premises and cloud environments, to calculate risk score per user, device and resource, and apply authentication policies.
Most Multi-Factor Authentication (MFA) solutions were designed as point solutions for specific systems or for certain types of assets (e.g., web applications). As such, the risk analysis and adaptive policies they can offer are limited to the specific systems they protect. They are incapable of protecting the variety of endpoints, applications, servers, legacy systems, infrastructure, data, cloud resources and IoT devices that exist in today’s organizations.
A holistic approach provides accurate risk analysis
Unlike these point solutions, Silverfort’s approach is different. Silverfort looks at authentication at the network level instead of integrating MFA into each individual asset. This approach enables authentication policies, visibility, user experience and risk analysis across all systems and environments.
Silverfort’s agentless architecture and approach enable visibility into all user activities, across all systems and environments, analyzing risk for every authentication request with accuracy.
“Monitoring all authentication activities in one centralized platform allows Silverfort to analyze more data than any other authentication solution — typically hundreds of authentication requests per user per day,” explains Hed Kovetz, CEO and Co-Founder of Silverfort. “This provides a far more accurate risk score and enables adaptive policies that are less disruptive yet more effective.”
Assessing risk with Silverfort’s AI-based risk engine
Silverfort’s risk engine combines 3 components that analyze authentication activities in real time to detect a range of malicious behaviors and threats.
Silverfort’s Risk Engine combines the following core components:
- Anomaly detection: Identifies deviations from normal activities based on a behavioral profile of each user and device.
- Recognition of known malicious patterns: Recognizes patterns of brute force attacks, lateral movement, ransomware and more.
- Threat indications from 3rd party security solutions: Instantly steps up the authentication requirements in response to threat alerts from third party solutions.
The combination of these components results in the accurate risk score and enables adaptive policies that are less disruptive yet more effective.