- Behavioral Location: Identifies trusted locations, frequency and patterns of users based on analysis of anonymized location and other behavioral inputs.
- Network Trust: Evaluates the frequency of network use and adjusts a risk score accordingly.
- Time & Usage Anomalies: Learns how and when employees normally access data to protect against instances of anomalous behavior.
- Device and App DNA: Builds a unique identifying signature for trusted, compliant devices and apps and uses this signature to detect and block access attempts by rogue, non-compliant devices.