Threat actors can bypass and exploit current 2FAs & MFAs: Attacks on SMS-based Authentications (SS7 Attacks, SIM Swaps, XSS Attacks and more), Attacks on OTPs (MITM, MITB, XSS Attacks, Social-engineering, Pass-the-Cookie Attacks, and more)
Risk Based Authentications (RBAs) could in fact be an impediment to having a thorough and complete Zero Trust Architecture. Instead of authenticating users based on 'risk', all users should be authenticated no matter what and where they are trying to access.
Identity Access Management (IAM) is an assembly and orchestration of software, tools, policies, governance, monitoring & auditing, and identity repositories. However, IAM is software-based, porous and hackable and contains user identities.
No collection or storage of User PII. Instead, IAmI's innovative PII-free only authenticates and transacts via encrypted tokenization services.
IAmI offers its authentication services via SDK's. Clients will greatly benefit from having their own Multi-Factor Authentication (MFA) platform, instead of surrendering all control and data to 3rd party services.
Users are prompted to verify every time their login credentials are used and before access is granted. Even if login credentials are stolen, users will be able to detect, identify, prevent, and immobilize unauthorized access, in real-time and 24/7.
IAmI does not use OTP tokens (hard or soft), nor does it generate cookies. IAmI can be deployed anywhere across the network to enforce micro-segmentations, safeguarding access from outside-in, across the network, to (escalated) privileges, and to critical "Jewel Crown" applications.
With customers worldwide being forced to stay home, they are now accessing the majority of their services online. They have now become more vulnerable than ever before to cyberattacks, particularly to COVID-19 based scams and new attacks surfaces from mobile and IoT devices in the home setting.
With IAmI, customers are now able to completely control access and security to their accounts, 24/7. Even if they get phished or encounter a malware, no threat actor will be able to get (unauthorized) access to their accounts at all. With IAmI's Strong Customer Authentication (SCA) solution, they will be able to prevent all suspicious activities tied to their account.
More importantly, while customers prevent and protect their accounts and services from attacks, they will also be protecting the integrity of the company brand as well.