Diversified Risk Identification for Full Protection
Automatically identify risks and threats, enabling intelligent identity authentication decisions based on login environment factors such as network, location, device, time, and IP address.
Time-Based
Risk identification based on time factors includes remote logins within short periods, unusual access times, access outside prescribed times, frequent logins, and more.
Device-Based
Risk identification based on device factors includes whether the device is authorized, whether it's a commonly used device, whether the device fingerprint is abnormal, and more.
Behavior-Based
Risk identification based on behavioral factors includes abnormal operations in sensitive applications, consecutive login failures, multiple different account logins from the same IP address, and more.