Cybercriminal attacks are increasing in frequency, scale and complexity. With Network Protected Identity, Gigya can detect suspicious login activity anywhere on our network — such as the sudden occurrence of thousands of failed login attempts in rapid succession from one account email or IP address. When that activity is detected, step-up authentication is enabled on that account email or IP address on sites where the pre-configured threshold is met.
Network Protected Identity in Action
NPI applies to you if you have any digital property active on Gigya’s platform using our Registration-as-a-Service solution to connect your users to your sites and apps. Here’s how it works:
Learn why Network Protected Identity is an important feature for enhancing security in today’s complex digital landscape and the basics of how it works.Read the data sheet
In this informative presentation, Gigya’s VP of Product Marketing, Rashmi Vittal, discusses what’s behind Gigya’s Network Protected Identity feature and shows you how it works.Sign up for the webinar