PingOne Protect
The PingOne Protect service provides capabilities to configure and retrieve risk evaluations from internal and external risk providers based on a specified risk policy.
Refer also to PingOne Protect’s integration with Ping Gateway for on-premise use of PingOne Protect with web applications protected by PingGateway.
Risk Policies
A risk policy is determined by your specific configuration settings. The risk policy enables you to customize a risk evaluation to fit your use case. The policy is used during a risk evaluation to calculate the risk scores for received events. For more information about risk policies, refer to Risk Policies.
Risk Evaluations
Use risk evaluations to calculate the risk level and other risk-related details associated with a received event based on the environment’s settings and data provided in the event. For more information about risk evaluation, refer to Risk Evaluations.
Risk Predictors
Risk predictors are employed by risk policies, and define thresholds for certain criteria (such as, IP Velocity, User Velocity, or User Location Anomaly) to determine whether there’s the potential for fraudulent user behavior. For more information refer to Risk Predictors.
Use Cases
|
These requests require |