Optimal IdM offers a comprehensive MFA solution, either as a standalone service sold as OptimalMFA or integrated with the OptimalCloud IAM solution.


A distinguishing feature of Optimal IdM is the integration with TypingDNA, a solution that analyzes and learns typing pattern behavior. This feature is a key enabler for a smooth user experience and passwordless authentication. After the solution successfully learns a user’s typing pattern, a user can log into an IT resource by typing in only their username or email address.


Optimal IdM supports multiple authentication methods, including push notifications via the proprietary Optimal Authenticator app, which works for Android, Windows, and iOS. Other authentication methods include FIDO2 devices, RADIUS, OTP and TOTP, SMS, and security questions.


For policy management, the platform allows the definition of MFA requirements based on group or organizational membership or on access to specific applications. Administrators can also configure adaptive MFA, which requires users to provide additional authentication factors based on behavior and risk profile as a continuous process rather than just once. Administrators can configure adaptive MFA to learn typical activities dynamically based on preferences over time or set static policies to define risk levels of different end-user-related factors.


Administrators can also implement the adaptive MFA by combining dynamic and static policies. Adaptive factors extract information such as user behavior, device, and location. The solution evaluates questions such as: Has the user ever accessed this data or application before? Is it out of the ordinary from the person’s usual tendencies? Is the login coming from a familiar device? Where is the request coming from? Is the IP address or country of origin considered suspicious? Does it make sense that the user would be in this place at this time?


Access the complete report now to learn more about the OptimalCloud and OptimalMFA!

Get Access To The GigaOm Analyst Report Today!








I agree to the Privacy Policy and Terms of Service.



  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.

Pin It on Pinterest