We believe the fashionable trend for “Adaptive Authentication” where Identity is determined by a software only technique based on the User’s “Use Profile” is flawed both in design principle and operation.

The Whitepaper details the weaknesses in this approach and shows how a different “Fortress Construction” design is superior.

Click to Download the Whitepaper