Variable authentication based on risk

Being able to vary the way you authenticate an end user based on the risk they present to your organization is important. For example, if a user is trying to access protected resources from an unknown/untrusted device, you may choose to present additional verification for that end user. You can even vary the resources available to that user based on their risk, and this all happens dynamically without the need for intervention by administrators.