{"id":15469,"date":"2023-07-05T13:41:51","date_gmt":"2023-07-05T10:41:51","guid":{"rendered":"https:\/\/authtake.com\/?page_id=15469"},"modified":"2023-08-03T13:42:41","modified_gmt":"2023-08-03T10:42:41","slug":"business-risk-based-authentication","status":"publish","type":"page","link":"https:\/\/authtake.com\/tr\/business-risk-based-authentication\/","title":{"rendered":"Business &#8211; Risk Based Authentication"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"15469\" class=\"elementor elementor-15469\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5cbbb elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-sticky-section-no\" data-id=\"0c5cbbb\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fd8e779\" data-id=\"fd8e779\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e3821b elementor-widget elementor-widget-heading\" data-id=\"2e3821b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Kurumsal<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba6526d elementor-widget elementor-widget-heading\" data-id=\"ba6526d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk Based Authentication<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f440fec elementor-widget elementor-widget-text-editor\" data-id=\"f440fec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Risk-Based Authentication (RBA), Ger\u00e7ek Zamanl\u0131 Tehdit Sinyalleri belirlemek i\u00e7in bir kullan\u0131c\u0131n\u0131n davran\u0131\u015f\u0131n\u0131 analiz ederek, bir kayna\u011fa veya sisteme eri\u015fmek isteyen kullan\u0131c\u0131n\u0131n her eri\u015fim talebi i\u00e7in bir risk puan\u0131 olu\u015fturur. E\u011fer eri\u015fim talebi riskli olarak de\u011ferlendirilirse, ek kimlik bilgisi istenebilir veya eri\u015fim talebi reddedilebilir.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f246057 elementor-widget elementor-widget-button\" data-id=\"f246057\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/authtake.com\/tr\/company-contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">\u0130leti\u015fim<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0449500 elementor-widget elementor-widget-text-editor\" data-id=\"0449500\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>\u00a0- 30 G\u00fcn \u00fccretsiz deneyin<\/p><p>\u00a0- \u0130stedi\u011finiz zaman iptal edin<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f30c080\" data-id=\"f30c080\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7276c4a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"7276c4a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-215dfc6\" data-id=\"215dfc6\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6865e67 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"6865e67\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-480e9b2\" data-id=\"480e9b2\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac3981c elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"ac3981c\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tG\u00fcn\u00fcm\u00fcz\u00fcn Problemi\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tBir sistem eri\u015fim talebi yap\u0131ld\u0131\u011f\u0131nda, geleneksel y\u00f6ntemlerde kullan\u0131c\u0131dan istenen temel do\u011frulama bilgileri bir kullan\u0131c\u0131 ad\u0131 ve \u015fifresinden olu\u015fur. Ancak h\u0131zla artan siber sald\u0131r\u0131lar, kullan\u0131c\u0131 kimlik bilgilerinin kolayca ele ge\u00e7irilmesine neden olmu\u015ftur. Ara\u015ft\u0131rmalar ayn\u0131 zamanda veri ihlallerinin zay\u0131f veya \u00e7al\u0131nm\u0131\u015f kimlik bilgileri nedeniyle meydana geldi\u011fini g\u00f6stermektedir.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c38d9f4\" data-id=\"c38d9f4\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd115a7 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"fd115a7\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tNeden Risk Tabanl\u0131 Kimlik Do\u011frulama?\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tKurulu\u015flar, verimsizlik veya m\u00fc\u015fteri kayb\u0131n\u0131 \u00f6nlemek i\u00e7in g\u00fcvenlik ve kullan\u0131m kolayl\u0131\u011f\u0131n\u0131 dengelemeye ihtiya\u00e7 duyarlar. Bu ba\u011flamda, S\u0131f\u0131r G\u00fcven stratejisine dayanan Risk Tabanl\u0131 Kullan\u0131c\u0131 Do\u011frulama mekanizmas\u0131, bu sorunlara bir \u00e7\u00f6z\u00fcm olarak ortaya \u00e7\u0131km\u0131\u015ft\u0131r. Eri\u015fim talebi s\u0131ras\u0131nda ger\u00e7ek zamanl\u0131 olarak \u00e7e\u015fitli risk fakt\u00f6rlerini dikkate alarak, risk seviyesini belirler ve d\u00fc\u015f\u00fck riskli eri\u015fim taleplerinde kullan\u0131c\u0131y\u0131 s\u00fcrt\u00fcnmelerden korurken, orta ve y\u00fcksek riskli eri\u015fim taleplerinde sadece ek kimlik bilgisi istenir.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-81b5fcd elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"81b5fcd\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3adb139\" data-id=\"3adb139\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c8f4a6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7c8f4a6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"821\" src=\"https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-998x1024.png\" class=\"attachment-large size-large wp-image-15556\" alt=\"\" srcset=\"https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-998x1024.png 998w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-292x300.png 292w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-768x788.png 768w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-12x12.png 12w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-600x616.png 600w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t-632x649.png 632w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/kindpng_6347708t.png 1411w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-71b3ce3\" data-id=\"71b3ce3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-308be45 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"308be45\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ak\u0131ll\u0131 Risk Tabanl\u0131 Kimlik Do\u011frulama: Daha Ak\u0131ll\u0131 Bir G\u00fcvenlik Yakla\u015f\u0131m\u0131<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4eab00a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4eab00a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Hibrit \u00e7al\u0131\u015fma modelinin yayg\u0131nla\u015fmas\u0131 ve buna ba\u011fl\u0131 olarak artan kimlik av\u0131 sald\u0131r\u0131lar\u0131, kurulu\u015flar\u0131 S\u0131f\u0131r G\u00fcven stratejisini benimsemeye zorlamaktad\u0131r. Risk Tabanl\u0131 Kimlik Do\u011frulama, sald\u0131rgan ve g\u00fcvenilir kullan\u0131c\u0131lar\u0131 birbirinden ay\u0131rarak gereksiz s\u00fcrt\u00fcnmeyi ortadan kald\u0131r\u0131r.<\/p><p>RBA, bir kullan\u0131c\u0131n\u0131n belirli bir eri\u015fim talebiyle ili\u015fkili riski belirlemek i\u00e7in kullan\u0131c\u0131 davran\u0131\u015f\u0131n\u0131 analiz eder ve bu analizleri kullanarak eri\u015fime izin verilip verilmeyece\u011fine veya ek kimlik do\u011frulama fakt\u00f6rleri istenip istenmeyece\u011fine karar verir. Bu, kurulu\u015flar\u0131n yetkili kullan\u0131c\u0131lar i\u00e7in rahats\u0131zl\u0131\u011f\u0131 minimize ederken siber tehditlere kar\u015f\u0131 korunmalar\u0131na yard\u0131mc\u0131 olur.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-456b202 elementor-widget elementor-widget-heading\" data-id=\"456b202\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/authtake.com\/tr\/company-contact-us\/\">Daha Fazlas\u0131<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f690c2c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"f690c2c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8cae2f7\" data-id=\"8cae2f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-630000d elementor-hidden-desktop elementor-widget elementor-widget-image\" data-id=\"630000d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"693\" height=\"451\" src=\"https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/dd.png\" class=\"attachment-large size-large wp-image-15573\" alt=\"\" srcset=\"https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/dd.png 693w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/dd-300x195.png 300w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/dd-18x12.png 18w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/dd-600x390.png 600w\" sizes=\"(max-width: 693px) 100vw, 693px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a67048c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a67048c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RBA Neden \u00d6nemli?\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91fce33 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"91fce33\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Risk-Based Authentication (RBA), Ger\u00e7ek Zamanl\u0131 Tehdit Sinyalleri belirlemek i\u00e7in bir kullan\u0131c\u0131n\u0131n davran\u0131\u015f\u0131n\u0131 analiz ederek, bir kayna\u011fa veya sisteme eri\u015fmek isteyen kullan\u0131c\u0131n\u0131n her eri\u015fim talebi i\u00e7in bir risk puan\u0131 olu\u015fturur. E\u011fer eri\u015fim talebi riskli olarak de\u011ferlendirilirse, ek kimlik bilgisi istenebilir veya eri\u015fim talebi reddedilebilir.<\/p><p>Hibrit \u00e7al\u0131\u015fma modelinin yayg\u0131nla\u015fmas\u0131 ve buna ba\u011fl\u0131 olarak artan kimlik av\u0131 sald\u0131r\u0131lar\u0131, kurulu\u015flar\u0131 S\u0131f\u0131r G\u00fcven stratejisini benimsemeye zorlamaktad\u0131r. Risk Tabanl\u0131 Kimlik Do\u011frulama, sald\u0131rgan ve g\u00fcvenilir kullan\u0131c\u0131lar\u0131 birbirinden ay\u0131rarak gereksiz s\u00fcrt\u00fcnmeyi ortadan kald\u0131r\u0131r.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54c937f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"54c937f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>RBA, kurulu\u015flar\u0131n yetkili kullan\u0131c\u0131lar i\u00e7in rahats\u0131zl\u0131\u011f\u0131 minimize ederken siber tehditlere kar\u015f\u0131 korunmalar\u0131na yard\u0131mc\u0131 olur.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-393ec4f elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"393ec4f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec1e833 elementor-hidden-tablet elementor-hidden-mobile elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"ec1e833\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"459\" height=\"486\" src=\"https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/ahappy-people.png\" class=\"attachment-large size-large wp-image-15567\" alt=\"\" srcset=\"https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/ahappy-people.png 459w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/ahappy-people-283x300.png 283w, https:\/\/authtake.com\/wp-content\/uploads\/2023\/07\/ahappy-people-11x12.png 11w\" sizes=\"(max-width: 459px) 100vw, 459px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8211; Business &#8211; Risk Based Authentication Risk-Based Authentication (RBA) determines real-time threat signals by analyzing the behavior of a user who wants to access a resource or system, and generates a risk score for each access request. If the access request is deemed risky, it can request additional identity information or deny the access request. FREE TRIAL \u00a0&#8211; Try 30 days for free. \u00a0&#8211; Cancel anytime. Today&#8217;s Problem When a system access request is made, the basic authentication information requested from the user in traditional methods consists of a username and password. However, rapidly increasing cyber attacks have resulted in user identity information being easily compromised. Research also shows that 81% of data breaches occur due to weak or stolen identity information. Why Risk Based Authentication? Organizations need to balance security and ease of use to avoid inefficiency or customer loss. In this regard, Risk-Based User Authentication mechanism, which is based on the Zero Trust strategy, has emerged as a solution to these problems. By taking into account various risk factors in real-time during the access request, it determines the risk level and requests additional identity information only in medium and high-risk access requests while protecting the user from frictions in low-risk level access requests. Intelligent Risk-Based Authentication: A Smarter Security Approach The widespread adoption of hybrid work and the consequent rise of phishing attacks are forcing organizations to adopt a Zero Trust strategy. Risk-Based Authentication eliminates unnecessary friction by distinguishing between attacker and trusted users for users. RBA analyzes user behavior to determine the risk associated with a given access request and uses that analysis to decide whether to allow or deny access or to request additional authentication factors. This helps organizations to protect against cyber threats while minimizing the inconvenience for authorized users. Learn More About Risk Based Authentication Why is Risk Based Authentication important? Risk-Based Authentication (RBA) determines real-time threat signals by analyzing the behavior of a user who wants to access a resource or system, and generates a risk score for each access request. If the access request is deemed risky, it can request additional identity information or deny the access request. The widespread adoption of hybrid work and the consequent rise of phishing attacks are forcing organizations to adopt a Zero Trust strategy. Risk-Based Authentication eliminates unnecessary friction by distinguishing between attacker and trusted users for users. RBA helps organizations to protect against cyber threats while minimizing the inconvenience for authorized users.<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/pages\/15469"}],"collection":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/comments?post=15469"}],"version-history":[{"count":25,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/pages\/15469\/revisions"}],"predecessor-version":[{"id":16175,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/pages\/15469\/revisions\/16175"}],"wp:attachment":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media?parent=15469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}