Apply different authentication factors ranging across different security levels across your whole organization to protect against unauthorized access while providing flexibility for users.
Set user or application policies to implement additional authentication factors for sensitive applications or users to restrict access to only those who need it. Specify password requirements for all or specific users.
Secure your company data from unathorized access and protect yourself from identity attacks by defining failed MFA challenges before users get locked out.
Completely restrict access to applications that contain sensitive data based on contextual factors to deny access from high-risk locations or IP addresses.