Gartner Research

Enterprise Adaptive Access: Are We There Yet?

Published: 12 September 2015

ID: G00277241

Analyst(s): Mark Diodati , Trent Henry


Enterprise adaptive authentication — along with mobile authentication techniques like OOB push and local biometric — will alter the classic authentication high-cost/low-usability equation. Adaptive authentication will become an essential part of continuous authentication initiatives.

Table Of Contents


  • A Brief History of Adaptive Authentication
  • Anatomy of an Adaptive Access Solution
    • Inputs
    • Actions
    • Additional Authentication
  • Authentication Challenges in the Modern Enterprise
    • Device-Anywhere Access
    • Partner and Contractor Constituencies
    • Social Logins: Barbarians at the Gate
  • Authentication: What Really Matters
  • Deficiencies of Traditional Authentication Methods
    • Too Expensive
    • Not Good Enough
  • The Enterprise Adaptive Perspective
  • Market Landscape
    • Vendors With Financial Services Adaptive Offerings
    • MFA Vendors
  • The Future of Enterprise Adaptive Access
    • Continuous Authentication
    • Replacement of Traditional Authentication
    • Mobile Authentication Technologies
    • Push Authentication
    • Local Biometric Authentication
    • New Elements and Context
  • Layering Is the Key to Successful Authentication
  • Step-Up Authentication
  • Identity Governance and Administration
    • Data Loss Prevention
  • Strengths
  • Weaknesses


  • Use OOB Identity Proofing
  • Use Device ID
  • Combine Enterprise Adaptive Access With SSO Systems
  • Integrate Enterprise Adaptive Access With Mobile Authentication
  • Anticipate Enterprise Adaptive Access for API Applications
  • Use Step-Up Authentication Sparingly
  • Watch for Continuous Authentication

The Details

  • Adaptive Access Integrations
    • Classic
    • Web Access Management
    • Browser-Based Federation
    • API-Based Federation
    • Standards Efforts

Gartner Recommended Reading

©2021 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.