日本語 for Digital Identity Authentication

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)

Overview risk assesses digital identity across the entire customer lifecycle from Account Opening, Visit, Login, Account Change, Transaction, to Post-Transaction.

Key Features

Continuous Risk Monitoring: Passive, continuous monitoring of behaviors and patterns can often separate legitimate from malicious website visitors.

Login Scoring: Authenticate logins by verifying identity and payment information, analyzing velocities, and checking whether credentials are available on the dark web.

Multi-Factor Authentication: Challenge a bot or suspicious user to confirm and/or maintain a higher-level assurance during a visit, application or transaction.

Key Benefits

  • Real-time Protection Flexible and modular verification is necessary to enable merchants to confirm a user’s identity, order details, and purchasing methods.

  • Frictionless Commerce Advanced technology enables organizations to test ‘intelligent commerce’ by thrilling customers with even greater convenience and speed.

  • Anomaly Detection A big part of building a threat intelligence program is identifying anomalies quickly, with certainty, and auto-triggering counter-measures.

  • Early Warning System Secure your transactions, websites and mobile apps. Be alerted of attacks as they happen, on your site and across the network.