Anomaly detection involves recognizing situations that could heighten the risk that an access request is not legitimate. It involves looking at normal as well as abnormal user behavior in the effort to achieve identity assurance. By watching behavior to see what is normal and what is not, you can unleash broad capabilities to improve both security and the user experience. An identity system with capabilities like these built into it allows security policies to leverage the information to automatically deny access or require additional authentication. Learn more about identity assurance in this white paper.”]
Source: https://www.csoonline.com/article/3208864/article.html