What Is Continuous Trusted Access?
Continuous Trusted Access is a method of creating a seamless and secure access experience for your users, both at the point of authentication and throughout the user session.
Continuous Trusted Access is a method of creating a seamless and secure access experience for your users, both at the point of authentication and throughout the user session.
Through a combination of risk-based authentication and session trust analysis, Continuous Trusted Access offers thorough, adaptive security that doesn't get in your users’ way unless it's absolutely necessary.
Continuous Trusted Access assesses the context of user risk at the time of authentication and adjusts security requirements up or down based on that context. If your user attempts access from an unfamiliar, unsecured wireless network, for instance, they may need to take further steps to authenticate their session. On a known network? The risk level and authentication requirements are decreased.
After authentication, Continuous Trusted Access uses new signals and controls to assess user risk in the established session and responds with further security protocols if it detects mid-session risks. This happens entirely behind the scenes, so users don't experience session interruption unless it's required to maintain a secure experience.
Continuous Trusted Access delivers a combination of frictionless user sessions and powerful security by improving three areas of concern in traditional security methods: