Product: All
Applies to: Everyone
The security verification is triggered based on the result of evaluating security behavior and risk-based authentication, referred to as adaptive authentication. Security behavior detection continually tracks specific user behavior and generates a challenge when any change in the tracked history of behavior for a given user is detected, such as a new device that has never been used or a new geographic location from which the user has never logged in to Intralinks.
Risk-based authentication is an additional layer of security that evaluates risk automatically using multiple features such as IP address, device, and behaviors for each user attempting to authenticate. Risk-based authentication is done with security behavior detection.