Any system you implement must provide the flexibility to adapt to the changing business and environmental challenges you face on a daily basis. Having to change or limit the needs of the business due to limitations in your systems is just unacceptable.

Adaptive Technologies allow you to override your MFA configuration on a contextual level for any login request - providing unlimited flexibility.

PerimeterMFA comes with a robust library of Adaptives and the system can be extended to meet your very specific requirements.

Location-Based Adaptives

Modify your MFA rules based upon the Geo-Location of the user request

Examples

  • Forbid all access from unauthorized locations like North Korea, China or Anonymous Networks
  • Only allow phone-enrollment while on company network
  • Do not allow login attempts from geographically impossible travel patterns (i.e. Los Angeles at 9:00am and Boston at 10:30am)
  • Let all users bypass secondary challenges if they are in the corporate headquarters

Time-Based Adaptives

Modify your MFA rules based upon the Time and Day of the user request

Examples

  • Require Authenticator, TOTP or SmarterUnlock outside of normal business hours
  • Do not allow access to self service during payroll processing

Content-Based Adaptives

Modify your MFA rules based upon the Requested Resource of the user request

Examples

  • Require Authenticator, TOTP or SmarterUnlock for financial applications
  • Do not allow access to critical applications to specific users

History-Based Adaptives

Modify your MFA rules based upon the History of the user's activity

Examples

  • Only allow access to critical applications from a known device for given user
  • Do not allow access to critical business applications from mobile devices
  • Establish Trust Policies where casual users may bypass secondary authentication if logging in from the same computer/IP address combination as previous logins