Best Risk-Based Authentication Software of 2024

Find and compare the best Risk-Based Authentication software in 2024

Use the comparison tool below to compare the top Risk-Based Authentication software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Uniqkey Reviews

    Uniqkey

    Uniqkey

    $4.95 per employee, per month
    163 Ratings
    See Software
    Learn More
    Uniqkey, a European company, excels in password and access management, empowering IT teams to control access within their organizations efficiently. It offers secure offline storage, automatic two-factor authentication, and Shadow IT management tools. Uniqkey's design complies with strict European GDPR standards, ensuring data privacy and security. Its platform is user-friendly, facilitating seamless integration into business operations, enhancing security and productivity. Uniqkey stands out by prioritizing data protection and regulatory compliance, making it a trustworthy partner for businesses aiming to bolster their cybersecurity infrastructure.
  • 2
    Auth0 Reviews

    Auth0

    Okta

    $35 per month
    774 Ratings
    See Software
    Learn More
    Identity is complex. It is important to deal with it. Rapidly integrate authorization and authentication for web, mobile, legacy, and legacy applications to allow you to focus on your core business. Many people believe that identity is too expensive and can't be saved. Auth0 users see a positive impact on their bottom line. You can authenticate users across all your applications using your own secure, standards-based, and custom unified login. Users are redirected to a central authorization site with Universal login. The authentication takes place on the same domain that the login. This increases security and protects against attacks like phishing or man-in-the middle. OAuth 2.0 recommends that native applications should only use external user agents (such the browser) for authentication flows. Universal login allows you to do this securely while also enabling SSO.
  • 3
    GateKeeper Proximity Enterprise Reviews

    GateKeeper Proximity Enterprise

    Untethered Labs, Inc.

    $3/user/month
    3 Ratings
    Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
  • 4
    RSA SecurID Reviews
    RSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity.
  • 5
    Ondato Reviews

    Ondato

    Ondato

    €149.00/month
    1 Rating
    Ondato offers identity verification, business onboarding, customer data platform, due diligence, and authentication solutions tailored to fit in your everyday workflow. Our tools fit the entire customer lifecycle management, starting from onboarding and ending with continuous user monitoring. It's a one-stop solution whether you're worried about compliance or are looking for a more user-friendly data management platform.
  • 6
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 7
    Cisco Duo Reviews
    Top Pick

    Cisco Duo

    Cisco

    $3 per user per month
    12 Ratings
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 8
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $6 per user per month
    32 Ratings
    LastPass is a comprehensive and secure password management tool that helps organization's solve their password security problems without slowing down employees. LastPass allows enterprises to secure password storage, centralize admin oversight and control shared access. Users can also be managed automatically by LastPass.
  • 9
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 10
    FusionAuth Reviews
    Top Pick
    FusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself.
  • 11
    The OptimalCloud Reviews

    The OptimalCloud

    Optimal IdM

    $2/user/month
    The OptimalCloud from Optimal IdM provides a scalable and affordable Identity and Access Management Solution that meets the security and usability requirements of small, medium-sized and large enterprises. The OptimalCloud platform is available for both consumer and workforce deployments. Each pricing tier includes multi-factor authentication (MFA), because good security shouldn't be more expensive. The OptimalCloud integrates with over 11 thousand applications, making it easier to set up and configure. It also offers 24 x 7 x 365 support with a 99.99% uptime guarantee.
  • 12
    HYPR Reviews

    HYPR

    HYPR | The Passwordless Company

    $4.00 per user/month
    HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers.
  • 13
    SecureAuth Reviews

    SecureAuth

    SecureAuth

    $1 per month
    SecureAuth makes it easy and seamless to create digital experiences that support Zero Trust initiatives. SecureAuth provides a frictionless user experience that protects employees, contractors, and partners. This helps to reduce business risk and increase productivity. Secure, secure, and unified customer experiences will enable you to support your digital business initiatives. SecureAuth uses adaptive risk analytics to analyze hundreds of variables such as human patterns, device fingerprinting and geolocation to create each user’s digital DNA. This allows for continuous authentication in real-time, ensuring the highest level security possible throughout the digital journey.
  • 14
    UserLock Reviews

    UserLock

    IS Decisions

    $2.00/month/user
    UserLock | Two Factor Authentication & Access Management for Windows Active Directory
  • 15
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 16
    PortalGuard Reviews

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods.
  • 17
    WSO2 Identity Server Reviews
    WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience.
  • 18
    Plurilock DEFEND Reviews

    Plurilock DEFEND

    Plurilock Security

    $9 per user per month
    Plurilock DEFEND provides full-time, continuous authentication throughout active computing sessions using behavioral biometrics and your existing employee keyboard and pointer devices. DEFEND relies on an invisible endpoint agent and machine learning techniques to confirm or reject user's identity biometrically based on console input as they work, without visible authentication steps. When integrated with SIEM/SOAR, DEFEND can help to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides a just-in-time identity certainty signal behind the scenes, making truly invisible login workflows possible when identity is already confirmed. DEFEND supports Windows, Mac OS, IGEL, Amazon Workspaces VDI clients.
  • 19
    Akku Reviews

    Akku

    CloudNow Technologies

    $5.00/year/user
    Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control.
  • 20
    Emailage Reviews

    Emailage

    LexisNexis

    $499 per month
    Your customers expect a seamless experience. Our network intelligence and predictive fraud score scoring can help you create seamless user experiences. Emailage by LexisNexis®, is a powerful fraud risk scoring tool that uses email intelligence. Customers expect flexibility in how they can interact with you via multiple channels. They expect you to be able to identify them and give them quick, easy access to your system, regardless of whether they are using a smartphone or tablet, laptop, or another device. They also want to be sure that their personal information and account passwords are secure so that fraudsters can't take over their accounts. This is a difficult task. Your ability to assess the risk of digital elements is crucial with the increase in digital channels for consumers. This is especially true if you, or your organization, collects minimal personal information to speed up customer onboarding and reduce data exposure risk.
  • 21
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security defense must be able to stop both internal and external threats. One common factor unites external and internal threats. The end user's compliance with security, policy, best practices. External elements can exploit an unacquainting internal user's compliance to sound security policies to gain entry. Although external threats can be dealt with using various mechanisms, such as firewalls and other security tools, it is inherently rooted in internal weaknesses. You can reduce internal threats by simply creating "automatic and enforceable" security policies. This will require end-users adhere to secure access protocols using trusted credentials. LogMeOnce Patented technology offers many ways to protect your agency, team members, and credentials with advanced automated authentication. LogmeOnce dashboard gives users powerful and unified access across all their applications.
  • 22
    Centagate Cloud Reviews

    Centagate Cloud

    Centagate Cloud

    $2 per month
    CENTAGATE CLOUD provides a central login option that protects all applications against security breaches using FIDO2 passwordless authentication. You can control, secure and protect your application access. All applications require one login credential. Strong digital security that eliminates fraud, phishing, and password theft. Because authentication is centralized, only one login credential will be required for all applications. Cost-effective, with minimal OPEX and zero CAPEX. CENTAGATE CLOUUD has many important features that make authentications more secure and protected. An authentication that requires two or three factors, such as what you have (device), who you are (biometrics), and what you know (password). An authentication that is based on previous logins' risk and behavior. These risk can be used to stop security breaches. Pre-integrated Securemetric FIDO2 server certified for authentication and registration.
  • 23
    BeyondCorp Enterprise Reviews

    BeyondCorp Enterprise

    Google

    $6 per user per month
    Secure access with integrated threat protection and zero trust. Secure access to critical apps, services. Integrated threat and data protection will protect your information. Agentless technology simplifies the user experience for administrators and end-users. A modern zero trust platform can improve your security. It is built on the backbone Google's global network and infrastructure to provide seamless and secure experiences with integrated DDoS protection and low-latency connections. Layered security that protects users, access, data and applications from malware, data loss and fraud. For extra protection, integrates signals and posture information from top security vendors. You can easily create policies based on user identification, device health, or other contextual factors to control access to applications, VMs, Google APIs, and other services.
  • 24
    GateKeeper Client Reviews

    GateKeeper Client

    GateKeeper

    $3 per user per month
    The Client application authenticates, authorizes and logs users onto their computer and websites when they're present. It also locks the computer automatically when they leave. IT administrators will find the GateKeeper proximity-based access control system to be extremely convenient and secure. Your users and computers can use wireless proximity authentication. The tokens are detected by machine-learning algorithms. Synchronization users, passwords and keys, as well as access rules. Uses the GateKeeper Vault or on-demand OTPs. Auto-locking secures cybersecurity blind spots. Advanced proximity-based authentication for websites and computers. The application detects when a user is walking away and locks the computer automatically using real-time presence detection. This eliminates the need to have cumbersome timeout policies. GateKeeper uses 2-FA (a secret PIN combined with the token's proximity) to increase security and reduce friction and time required to log in.
  • 25
    Strivacity Reviews

    Strivacity

    Strivacity

    $500 per month
    Strivacity quickly adds secure customer access management (CIAM), to your online properties. This allows you to grow your revenue, comply with rapidly-changing privacy regulations, and personalize your service using the insights you get into your customers' interactions with you. We can integrate into your existing app to allow your customers to self-service their accounts. This will allow you to scale your business as fast as possible. It's okay if your CIAM solution is no longer sufficient. Clicks (not codes) are used to reduce your TCO, and get your customers where you want them to go. Our Isolation By Design™, architecture protects regulated data and meets privacy standards such as GDPR and CCPA. Add in legal and security requirements, and the focus often drifts to the "C" (aka customers). Strivacity helps you keep your customers' focus by providing a single solution that meets all of their needs, goes live quicker, and doesn't require a team of developers or consultants to maintain it.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Overview of Risk-Based Authentication Software

Risk-based authentication (RBA) software is an application designed to strengthen the security of user access to digital accounts. It does this by evaluating the risk associated with each login attempt, taking into account various factors such as IP address, location, and device type. If the risk exceeds a certain threshold, additional authentication steps are triggered to verify the user’s identity before allowing them access.

RBA systems typically integrate with existing authentication mechanisms like two-factor authentication (2FA) and biometrics such as fingerprints or facial recognition. This means that users can continue to use their preferred level of authentication but will be subject to an additional layer of security when their account is considered at high risk. For instance, if an account is accessed from an unknown device or location outside the usual area for that user, they may be asked to provide a one-time code sent via text message in addition to their normal credentials before being allowed entry.

RBA systems can also analyze behaviors over time to detect suspicious patterns or anomalies. For example, if multiple unsuccessful login attempts have been made from different locations within a short period of time then this could indicate malicious activity such as brute force hacking attempts and trigger additional verification measures - such as requiring users to answer personal questions or log in using their mobile device's GPS data - before granting access.

The effectiveness of RBA depends on how accurately it can distinguish legitimate user activity from malicious threats and how well users understand how it works so that they do not become frustrated when prompted for additional verification steps. However, many organizations are now beginning to embrace RBA due its ability to reduce fraudulent activity while still providing a secure but convenient user experience - making it an increasingly popular choice for modern businesses who value both security and convenience in equal measure.

Reasons To Use Risk-Based Authentication Software

  1. Improves Security: Risk-based authentication software utilizes advanced algorithms and other techniques to identify potential malicious activity, helping to protect against fraud and unauthorized access.
  2. Cost Savings: By utilizing real-time risk assessment capabilities, organizations can automatically deny suspicious transactions or require additional verification steps which helps prevent costly risks associated with online security breaches.
  3. Enhanced User Experience: Implementing risk-based authentication provides enhanced user experience by removing the need for users to remember a variety of complicated passwords or suffer through tedious account recovery processes in case of forgotten credentials.
  4. Increased Flexibility: With the right risk-based authentication solution, organizations can easily customize their security policies based on the type of data being accessed, level of task complexity, etc., allowing them to quickly adjust as threats and regulations evolve over time.
  5. Improved Regulatory Compliance: Risk-based authentication solutions help organizations meet regional and industry compliance requirements by providing strong identity verification methods that are compliant with current security standards such as PCI DSS or GDPR requirements.

Why Is Risk-Based Authentication Software Important?

Risk-based authentication software is an important tool for protecting organizations from malicious attacks and unauthorized access to sensitive information. This type of software provides a powerful layer of defense that can identify suspicious activity, detect user anomalies, and flag potential threats before they cause significant damage or disruption.

In today’s digital landscape, organizations are facing an increased risk of cyberattacks due to the growth of internet connected devices and services. It is critical for organizations to have robust security measures in place to protect their networks from malicious actors as well as internal threats like employee negligence or careless mistakes. Risk-based authentication software helps organizations mitigate these risks by verifying identity and monitoring activities more effectively than traditional methods.

Risk-based authentication software utilizes advanced algorithms and artificial intelligence (AI) technology to study patterns in data and detect abnormalities in user behavior. These systems use indicators like geolocation data, device type, IP address history, login history, recent activity logs, etc., to assess risk levels associated with a given authentication attempt. Organizations can customize this system's settings so that higher risk activities will trigger additional verification steps like two factor authentication codes or CAPTCHA fields.

By employing a multilayered approach to verify user identities through risk-based authentication software, organizations can better protect their networks against phishing attacks and other threats posed by malicious outsiders or insiders seeking unauthorized access to sensitive systems or data stores. In addition to security benefits, this type of system eliminates some manual processes associated with user credential management since it automates many of the logins required for various applications across the organization's network environment. Ultimately this increases productivity while reducing costs associated with manual labor currently used for similar tasks such as password resetting or account lockout procedures when users cannot remember credentials for accessing secure systems & websites.

Features Offered by Risk-Based Authentication Software

  1. Risk Scoring: Risk-based authentication software uses algorithms to score interactions and activities according to their risk levels. It helps identify risky behavior and suspicious activities, such as attempted fraud or identity theft.
  2. Multi-factor Authentication: This feature allows users to access accounts by requiring a combination of two or more authentication factors like passwords, tokens, biometrics, cards, etc. It is designed to provide additional security layers beyond the traditional username and password authentication.
  3. Identity Verification: This feature verifies the user's identity through methods such as knowledge-based questions or photo ID verification. It helps prevent unauthorized access to the system by ensuring that only legitimate users are allowed to access information.
  4. Device Identification: Risk-based authentication software utilizes device identification technology which enables it to recognize any device used for accessing an account via unique identifiers embedded in the hardware of that particular device and stored securely in an encrypted database maintained by the software provider.
  5. Contextual Analysis: This feature takes into account various data points collected during an authentication process such as time, location and IP address of login attempt along with user’s digital footprint including online behavior patterns and usage history to determine if it’s a genuine login attempt from a trusted user or not before allowing access into secure systems/accounts/information systems.

Who Can Benefit From Risk-Based Authentication Software?

  • Business Owners: Risk-based authentication software can help businesses deter fraudulent activity and provide greater protection for customer data.
  • eCommerce Sites: Risk-based authentication can help eCommerce sites verify the identity of customers in order to ensure secure transactions.
  • Banks & Financial Institutions: Risk-based authentication software offers a higher level of security for online banking and financial transactions, providing extra protection against fraudsters.
  • Healthcare Providers: These types of software solutions can help healthcare providers safeguard patient data while still allowing legitimate access to sensitive information.
  • Government Agencies & Educational Institutions: Risk-based authentication ensures that only authorized personnel have access to confidential information, protecting these institutions from unauthorized access or hacking attempts.
  • Corporate Employees: By verifying user identities through risk assessment, organizations are able to protect corporate assets while promoting a safer work environment.
  • Online Gamers & Social Network Users: Risk based authentication systems are designed to protect users’ private information while they are engaging in activities such as gaming or social networking online.

How Much Does Risk-Based Authentication Software Cost?

The cost of risk-based authentication software can vary widely depending on the product and its features. Generally, this type of software is sold as an annual subscription that ranges from a few hundred to several thousand dollars per user per year. Factors such as the number of users and features required will influence pricing significantly.

For organizations needing more advanced authentication options, they may be looking at a cost closer to tens of thousands of dollars annually for enterprise level solutions with multiple layers of security and complex integration capabilities. As the technology evolves, prices are likely to come down over time as more vendors enter the market with competing solutions.

Risk-Based Authentication Software Risks

  • Security Breaches: Risk-based authentication software is vulnerable to security breaches due to malicious actors gaining access to the system. This could potentially result in unauthorized users having access to sensitive information or systems.
  • False Positives: The algorithms used in risk-based authentication software are not perfect, and can often give false positives when analyzing user data. This may lead to legitimate users being blocked from accessing a system or given limited access.
  • Data Integrity: If the data used for risk-based authentication is not secure, then the entire process can be compromised. Attackers could manipulate user data to bypass security protocols and gain access to a system undetected.
  • Privacy Issues: Risk-based authentication requires collection of personal user data which may be subject to privacy concerns. If this data is mishandled or leaked, it could have serious consequences for the affected individuals.
  • System Overload: Risk-based authentication software can also place an extra load on a system as it has to continually analyze user data for potential threats and determine appropriate levels of access. This can slow down performance and lead to disruption for legitimate users trying to use the system.

Types of Software That Risk-Based Authentication Software Integrates With

Risk-based authentication software can integrate with many different types of software. These include identity management systems, user and access management tools, network security solutions, web applications, and other authentication mechanisms such as biometric scanners. Integrating with these systems allows risk-based authentication to verify user identity more quickly and securely than ever before. By combining multiple layers of authentication and identity checks, it's possible to have both more reliable security and more efficient customer experiences. This type of software also enables organizations to protect their data by requiring additional verification for suspicious activities or high-risk accounts. Furthermore, risk-based authentication is often used in conjunction with single sign-on (SSO) systems so that users can easily log into different services while using the same credentials.

Questions To Ask When Considering Risk-Based Authentication Software

When considering risk-based authentication software, it is important to ask the following questions:

  1. How exactly does the software measure user risk? Does it consider factors such as IP address, device characteristics, behavioral patterns and user demographics?
  2. What type of multi-factor authentication does the software use for verification? e.g. password or biometric data
  3. Can users adjust their own security settings within the system or do they require administrative permissions?
  4. Is there an option to add additional layers of security when needed (e.g., two-step verification) for high-risk accounts?
  5. Does the application have built-in safety features that protect against malicious attacks in case a hacker breaches its system?
  6. What kind of customer support can customers rely on in case of any issues related to the software’s functionality or security?
  7. Are there measures taken to guarantee compliance with industry standards such as GDPR or HIPAA/HITECH Act requirements?
  8. How often is the system updated with new version releases and patches to ensure optimal performance and security levels are maintained over time?