Jan 17, 2019
Innovative solutions for continuous authentication
Our latest cooperation with the BehavioSec’s Behavioral Biometrics Platform enhances security by invisibly authenticating individuals according to unique online behaviors nearly impossible to impersonate with malicious code, like how a mobile device is held in the hand, touchscreen inputs, cursor and mouse movements and physical time and location data. Integrating with risk scoring systems, BehavioSec’s real-time analysis of these and other metrics power a new line of defense blocking suspicious activities or triggering additional monitoring – without impacting productivity and the user experience.
Key advantages of the platform include:
- Accuracy: BehavioSec’s platform is proven to yield low false positives alerts and deliver detailed information for real-time fraud detection and forensic purposes.
- Availability: BehavioSec’s platform can be deployed on-premise or in the cloud by the enterprise, giving customers unmatched flexibility and control over end user privacy.
- Continuous, seamless authentication: Efficiently combining identity and security functions, BehavioSec continuously studies behaviors to spot suspicious activity, denying blind spots necessary for remote access Trojan (RATs) malware, bots, man-in-the-browser (MITB) attacks and other threats to compromise accounts or files.
- Proven value: Customers quickly discover measurable cost savings from lower fraud incidences, coupled with fewer customer support calls and false positive issues associated with traditional authentication tools across billions of transactions and continuously verifying millions of users.
Together with BahavioSec, Ergonomics offers you a security solution to detect user behavior anomalies early on and to enable continuous authentication. The solution measures the unmistakable combination of typing characteristics such as the dynamics of keystrokes, touch, mouse movement, and more, to give each user an individual profile of their typing behavior and confirm their identity. Typical attack scenarios such as the use of bots, reply attacks, Microsoft scam and the like can be quickly identified to initiate countermeasures or initiate additional authentication steps in the case of abnormalities.