Brute Force Protectioni Prevents automated attacks by limiting failed login attempts, reducing the risk of unauthorized access and protecting user accounts from credential stuffing attacks. |  |  |  |  |
Suspicious IP Throttlingi Mitigates attack risk by slowing down blocking login attempts from suspicious IPs, ensuring unauthorized access is more difficult and reducing the impact of attacks. |  |  |  |  |
Enhanced Password Protectioni Strengthens user credentials by enforcing password complexity and checking against known breaches, reducing the chances of compromised accounts. |  |  |  |  |
Basic Breached Password Detectioni Reduces password vulnerability by preventing users from using breached or compromised passwords, enhancing overall account security. |  |  |  |  |
Credential Guardi Protects sensitive data by encrypting credentials during authentication, ensuring user data remains secure even if intercepted. |  |  |  |  |
Bot Detectioni Prevents bot-driven attacks by identifying and blocking non-human login attempts, reducing the risk of automated exploitation of accounts. |  |  |  |  |
Number of MFA Factors Enrolledi The total number of MFA factors a tenant has enabled for better security. | 2 | 5 | 5 | 5 |
Pro MFA Factorsi Boosts authentication strength with advanced MFA methods, such as biometrics and hardware tokens, increasing the difficulty for attackers to bypass security. |  | 2 | 3 | 3 |
Enterprise MFA Factorsi Meets enterprise needs by offering robust MFA options tailored for large organizations, ensuring compliance with high security standards. |  |  |  |  |
Adaptive MFAi Improves user experience and security by dynamically adjusting MFA requirements based on risk, reducing friction for low-risk access while protecting high-risk activities. |  |  |  |  |
Security Centeri Simplifies security management by offering a single view for monitoring, analyzing, and responding to security events in real-time. |  |  |  |  |
Continuous Session Protectioni Protects active sessions by ensuring users remain secure during their sessions, forcing re-authentication when suspicious behavior is detected. |  |  |  |  |
FAPI certified Security Profilei Ensures high security standards by meeting financial-grade API security requirements, ideal for applications dealing with sensitive financial data. |  |  |  |  |
Compliance Certificationsi Ensures regulatory compliance by providing certifications like HIPAA and BAA, ensuring data is securely handled for healthcare and financial applications |  |  |  |  |
HIPAA/BAAi Supports HIPAA compliance by enabling secure handling of PHI and offering signed BAAs, helping healthcare organizations meet legal requirements and reduce risk. |  |  |  |  |
Prioritized Security Log Streamsi Streamlines security monitoring by prioritizing high-impact security events, enabling faster response times to critical incidents. |  |  |  |  |
Private Key JWTi Secures token integrity by using private key JWTs to sign authentication tokens, protecting against token tampering and unauthorized access. |  |  |  |  |
OIDC Back-Channel Logouti Ensures unified logout by securely logging users out of all connected applications, preventing lingering sessions and reducing security risks. |  |  |  |  |