The PingOne Protect service provides capabilities to configure and retrieve risk evaluations from internal and external risk providers based on a specified risk policy.

Risk Policies

A risk policy is determined by your specific configuration settings. The risk policy enables you to customize a risk evaluation to fit your use case. The policy is used during a risk evaluation to calculate the risk scores for received events. For more information about risk policies, see Risk Policies.

Risk Evaluations

Use risk evaluations to calculate the risk level and other risk-related details associated with a received event based on the environment’s settings and data provided in the event. For more information about risk evaluation, see Risk Evaluations.

Risk Predictors

Risk predictors are employed by risk policies, and define thresholds for certain criteria (such as, IP Velocity, User Velocity, or User Location Anomaly) to determine whether there’s the potential for fraudulent user behavior. For more information see Risk Predictors.

Use Cases