How Does Continuous Trusted Access Work?
Through a combination of risk-based authentication and session trust analysis, Continuous Trusted Access offers thorough, adaptive security that doesn't get in your users’ way unless it's absolutely necessary.
Continuous Trusted Access assesses the context of user risk at the time of authentication and adjusts security requirements up or down based on that context. If your user attempts access from an unfamiliar, unsecured wireless network, for instance, they may need to take further steps to authenticate their session. On a known network? The risk level and authentication requirements are decreased.
Session Trust Analysis
After authentication, Continuous Trusted Access uses new signals and controls to assess user risk in the established session and responds with further security protocols if it detects mid-session risks. This happens entirely behind the scenes, so users don't experience session interruption unless it's required to maintain a secure experience.