Brute Force Protectioni Prevents automated attacks by limiting failed login attempts, reducing the risk of unauthorized access and protecting user accounts from credential stuffing attacks. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Suspicious IP Throttlingi Mitigates attack risk by slowing down blocking login attempts from suspicious IPs, ensuring unauthorized access is more difficult and reducing the impact of attacks. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Enhanced Password Protectioni Strengthens user credentials by enforcing password complexity and checking against known breaches, reducing the chances of compromised accounts. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Basic Breached Password Detectioni Reduces password vulnerability by preventing users from using breached or compromised passwords, enhancing overall account security. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Credential Guardi Protects sensitive data by encrypting credentials during authentication, ensuring user data remains secure even if intercepted. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Bot Detectioni Prevents bot-driven attacks by identifying and blocking non-human login attempts, reducing the risk of automated exploitation of accounts. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Number of MFA Factors Enrolledi The total number of MFA factors a tenant has enabled for better security. | 2 | 5 | 5 | 5 |
Pro MFA Factorsi Boosts authentication strength with advanced MFA methods, such as biometrics and hardware tokens, increasing the difficulty for attackers to bypass security. | .png&w=48&q=75) | 2 | 3 | 3 |
Enterprise MFA Factorsi Meets enterprise needs by offering robust MFA options tailored for large organizations, ensuring compliance with high security standards. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Adaptive MFAi Improves user experience and security by dynamically adjusting MFA requirements based on risk, reducing friction for low-risk access while protecting high-risk activities. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Security Centeri Simplifies security management by offering a single view for monitoring, analyzing, and responding to security events in real-time. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Continuous Session Protectioni Protects active sessions by ensuring users remain secure during their sessions, forcing re-authentication when suspicious behavior is detected. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
FAPI certified Security Profilei Ensures high security standards by meeting financial-grade API security requirements, ideal for applications dealing with sensitive financial data. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Compliance Certificationsi Ensures regulatory compliance by providing certifications like HIPAA and BAA, ensuring data is securely handled for healthcare and financial applications | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
HIPAA/BAAi Supports HIPAA compliance by enabling secure handling of PHI and offering signed BAAs, helping healthcare organizations meet legal requirements and reduce risk. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Prioritized Security Log Streamsi Streamlines security monitoring by prioritizing high-impact security events, enabling faster response times to critical incidents. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
Private Key JWTi Secures token integrity by using private key JWTs to sign authentication tokens, protecting against token tampering and unauthorized access. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |
OIDC Back-Channel Logouti Ensures unified logout by securely logging users out of all connected applications, preventing lingering sessions and reducing security risks. | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) | .png&w=48&q=75) |