Fraud Prevention and Online Authentication Report 2019/2020
The Paypers interviewed Jordan Blake, BehavioSec VP of Products, on the potential of behavioural biometrics and how to best use this deep authentication technology
How does BehavioSec develop the potential of behavioural biometrics and how do your customers leverage this technology?
In 2008, BehavioSec launched with a mission: to apply the nascent area of machine learning to behavioural biometrics the concept of leveraging someones behaviour to positively identify them. Today, our companys software platform protects billions of transactions across mobile apps and Websites by studying users typing patterns, touch screen gestures and even the way they hold their devices to discern authentic users behaviour from criminals, bots, or malware used to commit fraud, hijack accounts, or steal data. Customers leverage our platform in two primary ways: They use it to drastically reduce the number of legitimate end-users who are unnecessarily targeted by existing, noisy authentication signals. When an organisation isnt able to establish that an end-user is authentic, that user may be inconvenienced in a number of ways such as by having to answer obscure security questions, respond to CAPTCHAs, deal with heavy-handed password measures and may be subject to account lockouts and long phone calls to customer service. Organisations that utilise BehavioSec can significantly reduce reliance on such unfriendly safety measures.
Our platform is also leveraged to reduce fraud and the costs associated with it. Fraudsters find myriad ways to scam their way into users accounts, whether it be leveraging a shared password found in a data breach, targeting thousands of accounts with a login bot, performing a sophisticated SIM swap attack or even coaching a user over the phone (i.e. a voice-phishing or vishing attack). Regardless of the tactics used, our technology profiles authentic user behaviour in such a way that a fraudster, even with the keys to the proverbial kingdom, simply cannot replicate it.
By bringing BehavioSec into the mainstream market, our efforts are influencing the standards and norms in the industry, bringing about changes that help reduce the amount of financial loss that organisations incur every year due to cyber theft and fraud. In the fight to protect consumers from ever resourceful fraudsters and cybercriminals, behavioural biometrics offers significant advantages over other authentication technologies. We turn users into securitys strongest link by helping them stop attacks by just being themselves.
Could you thoroughly explain how continuous authentication works?
A consistent, individual signature marks the essence of human movement and touch every movement you make is influenced by personal style/preferences, speed, pressure, and dexterity. This also applies in the digital world. No one else can replicate exactly how we physically interact with our devices. BehavioSecs platform plays off this, continuously monitoring, and authenticating users based on their unique physical behaviours, throughout each session, not just once at login.
Powered by this unique application of behavioural biometrics, our companys platform integrates with websites and apps to analyse user behaviour in real time, enabling organisations to block or flag suspect transactions.
This anti-fraud protection surpasses one-time authentication measures like passwords and thumbprints by enabling organisations to invisibly and unobtrusively authenticate users by validating their personal mannerisms.
In which way is behavioural biometrics relevant in the PSD2s SCA context?
The PSD2 mandates that payment service providers must ensure Strong Customer Authentication (SCA), which comprises at least two factors from three different categories knowledge (e.g. password), possession (e.g. smartphone), and inherence (e.g. unique attributes of an individuals behaviour, like patterns in how users hold their mobile devices and interface with websites and browsers). Behavioural biometrics is an ideal technology for PSD2 compliance because it combines inherence with traditional login credentials, offering dramatically enhanced defences from account hijacking and fraud. Every customer and business handling online payments face mounting threats of fraud and abuse because login credentials are widely breached, and it is trivial for bots and other malicious programs to impersonate account holders names and devices. Behavioural biometrics breaks this cycle by giving institutions and payment companies the ability to block login attempts that deviate from known users behaviours.
There are several challenges for behavioural biometrics application related to privacy, impersonation attack (spoofing), and even error rates. How does your company meet these challenges to make this technology work at its best?
Privacy can be very well managed with this technology. For example, we do not gather or use any end user biometric data, nor are we interested in capturing PII like credentials. We provide the software platform that our customer organisations around the world then administer in their operations to protect their services and consumers.
Additionally, another benefit of our platform is the accuracy and low error rates. The platform has proven itself to yield low false positive alerts and delivers detailed information for real-time fraud detection and forensic purposes. Our customers discover measurable cost savings from lower fraud incidences, coupled with fewer customer support calls and false positive issues associated with traditional authentication tools across billions of transactions and millions of users.
What other developments do you have in the pipeline for 2020?
Our goal is to enable customers to mitigate risk and further link security and trust to their brands. We have ongoing product updates being introduced that further strengthen BehavioSecs platform and break the otherwise chronic password breach cycle.
About Jordan Blake
Jordans role as BehavioSecs VP of Products drives the vision and growth of cyber safety solutions while in addition to ensuring quality and client satisfaction. His 20-year career in product management, internet security, cyber security, and cyber safety solutions makes him the best choice to lead the product division. Jordan has held many Product Management roles with global industry leaders like IBM, and Symantec.
Founded in 2008 out of groundbreaking academic research, BehavioSecs technology allows companies to continuously verify digital identities with superior precision, in real-time. BehavioSec is the only enterprise-grade vendor used in global deployments safeguarding billions of transactions. BehavioSec investors include Forgepoint Capital, Cisco, ABN AMRO, Conor Ventures and Octopus Ventures.
- Security of online voting questioned | News, Sports, Jobs - The Daily Times - February 16th, 2020
- This may be the last piece I write: prominent Xi critic has internet cut after house arrest - The Guardian - February 16th, 2020
- An Alternative to Windows 7 - Budapest Business Journal - February 16th, 2020
- North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The Indian Express - February 16th, 2020
- Microsoft Patch Tuesday fixes IE zeroday and 98 other flaws - We Live Security - February 16th, 2020
- 'More guidance and regulation': Zuckerberg requests government rules on 'what discourse should be allowed' - Washington Examiner - February 16th, 2020
- Internet of Things (IoT) Security Product Market: Development Factors and Investment Analysis by Leading Manufacturers 2018 2026 - TechNews.mobi - February 16th, 2020
- Our personal health history is too valuable to be harvested by the tech giants - The Guardian - February 16th, 2020
- Cyber Security Today The latest FBI Internet crime report, adware on the rise, attacks on Wi-Fi and more - IT World Canada - February 15th, 2020
- Indias proposed internet regulations can threaten privacy everywhere - The News International - February 15th, 2020
- Antivirus Is Not Enough in 2020: Here is Why - laprogressive.com - February 15th, 2020
- FBI: Cybercrime losses tripled over the last 5 years - We Live Security - February 15th, 2020
- AIoT Convergence of Artificial Intelligence with the Internet of Things - EnterpriseTalk - February 15th, 2020
- Indias proposed internet regulations could threaten privacy everywhere - The Verge - February 15th, 2020
- Global Internet of Things (IoT) Security Market Key Players, Share, Trend, Segmentation and Forecast to 2026: Cisco Systems, Intel Corporation, IBM... - February 15th, 2020
- Romance scammers stole $475m last year. Here's how to spot them - Verdict - February 15th, 2020
- Safer Internet Day 2020 Together for a better internet - Security Boulevard - February 14th, 2020
- Internet's safe-keepers forced to postpone crucial DNSSEC root key signing ceremony no, not a hacker attack, but because they can't open a safe - The... - February 14th, 2020
- Here's how to avoid becoming a victim of a tax scam - AZ Big Media - February 14th, 2020
- Will Weak Passwords Doom the Internet of Things (IoT)? - Security Intelligence - February 14th, 2020
- Bithumb Employee Found Guilty of Security Failings that Led to Hack - Cryptonews - February 14th, 2020
- Will your vote count? Ohio working to increase election security - WHIO - February 14th, 2020
- Perimeter 81 Introduces SASE Platform This latest offer is based on a partnership with investor and - Channel Futures - February 14th, 2020
- NHS Secure Boundary the next layer of cyber protection for the NHS - Digital Health - February 14th, 2020
- Global Internet of Things (IoT) Security Market Segmentation along with Regional Outlook, Competitive Strategies, Factors Contributing to Growth and... - February 14th, 2020
- North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The New York Times - February 14th, 2020
- TechForce Aberdeen event to kick off Cyber Scotland Week - The Scotsman - February 14th, 2020
- Security Strategy: Moving Away From Tried and True - Security Boulevard - February 5th, 2020
- Internet Security Software Market investigated in the latest research - WhaTech Technology and Markets News - February 5th, 2020
- What Is Log Management, and Why Is It Important? - Security Boulevard - February 5th, 2020
- Latest Released 2020 Version Of Internet Security Market With Market Data Tables, Graphs, Figures and Pie Chat - TheLoop21 - February 5th, 2020
- Booter Boss Busted By Bacon Pizza Buy - Krebs on Security - February 5th, 2020
- Yet another Windows 10 fail as new update breaks the internet - heres how to fix it - TechRadar India - February 5th, 2020
- 'Formjacking' Is the New Internet Scam We Need to Watch Out For - q985online.com - February 5th, 2020
- Kiwis think benefits of the internet outweigh the negatives - SecurityBrief New Zealand - February 5th, 2020
- GAO: DHS and Agencies Must Work to Improve Cybersecurity - HSToday - February 5th, 2020
- Government to strengthen security of internet-connected products - GOV.UK - January 31st, 2020
- DigiCert Leads Initiative to Enhance EV SSL Certificates - Security Boulevard - January 31st, 2020
- eScan Internet Security Suite - Download - January 30th, 2020
- Internet Security - January 30th, 2020
- Best malware removal software of 2020: free and paid anti-malware tools and services - TechRadar - January 30th, 2020
- Government to strengthen security of internet-connected products - SecurityNewsDesk - January 30th, 2020
- IoT security: Your smart devices must have these three features to be secure - ZDNet - January 30th, 2020
- Millions of Wawa customers data breached selling on dark web - wobm.com - January 30th, 2020
- DigiCert CEO: Focus Security and Privacy on the Person - Infosecurity Magazine - January 30th, 2020
- CounterAct Cybersecurity Group Launches End-to-End Approach to Help MSPs Protect Their Businesses and Customers from Information Security Threats -... - January 30th, 2020
- The US Space Force Has a Rough Launch on the Internet - WIRED - January 30th, 2020
- Startup MGZN The only Arab company on eSecurity Planet's Top 18 Cybersecurity Startups 2020 is this one! - Startup MGZN - January 30th, 2020
- Bitdefender wants to protect your device for just over 7 dollars, but there's a catch - TechRadar - January 26th, 2020
- How scammers take advantage of stressed-out taxpayers - The Guardian - January 26th, 2020
- Here's the Top Cyber-Security Software You Need To Consider Downloading For 2020 - Grit Daily - January 26th, 2020
- Limited internet to be restored in Kashmir, no access to social media - Reuters - January 26th, 2020
- Analyzing AppFolio (NASDAQ:APPF) and Cyren (NASDAQ:CYRN) - Riverton Roll - January 26th, 2020
- The Rise of the Internet of Things | 2020-01-20 - Security Magazine - January 25th, 2020
- Protecting Websites from Magecart and Other In-Browser Threats - Security Boulevard - January 25th, 2020
- Off-campus wireless internet security on par with University - Kent Wired - January 25th, 2020
- Jeff Bezos Phone Hack Should Terrify Everyone - The New York Times - January 25th, 2020
- Limited internet to be restored in Kashmir, no access to social media - WSAU News - January 25th, 2020
- Cyber Security Today Kids clothes site hacked, a new phony email extortion scam and be careful with Internet Explorer - IT World Canada - January 25th, 2020
- Experts write to government on cyber fixes - Economic Times - January 25th, 2020
- Internet Security Software Market by Types, Applications, Countries and Forecasts to 2026 - Vital News 24 - January 24th, 2020
- An Open Source Effort to Encrypt the Internet of Things - WIRED - January 24th, 2020
- Local News Role of the internet in human trafficking to be highlighted at summit in SLO - KSBY San Luis Obispo News - January 24th, 2020
- Global Internet of Things (IoT) Security Market | By Component,By Type,By Application Area Dagoretti News - Dagoretti News - January 24th, 2020
- Internet Security Market to Reap Excessive Revenues by 2026 Dagoretti News - Dagoretti News - January 19th, 2020
- How to Secure Your Windows 7 PC in 2020 - How-To Geek - January 19th, 2020
- Security fears saw nearly half of Europe use the internet less during 2018 - The Brussels Times - January 19th, 2020
- Senate Passes Legislation to Help Boost and Secure the Internet of Things - Nextgov - January 19th, 2020
- Internet of Things presents the next frontier of cyberattacks - ITProPortal - January 19th, 2020
- Ooma Improves on Phone and Home Security with New Products for Cord Cutters - Cord Cutters News, LLC - January 19th, 2020
- Windows 7 computers will no longer be patched after today - Naked Security - January 19th, 2020
- How the Trump administration is secretly assisting Iranian protesters - Washington Examiner - January 19th, 2020
- Iowa results will be compiled over the internet, hacking threat aside - The Fulcrum - January 19th, 2020
- Cyren (NASDAQ:CYRN) Stock Rating Lowered by Zacks Investment Research - Riverton Roll - January 19th, 2020
- Password Managers: What Are They & How to Use Them? - TechAcute - January 19th, 2020
- EZVIZ C6CN pan-and-tilt security camera review: Motion tracking keeps intruder in this camera's sights - TechHive - January 19th, 2020
- New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware - ZDNet - January 6th, 2020
- BlackBerry Collaborating with Amazon Web Services to Demonstrate Safe, Secure, and Intelligent Connected Vehicle Software Platform for In-Vehicle... - January 6th, 2020
- Internet of Things security firm Armis in talks to be acquired -media - Nasdaq - January 6th, 2020
- The Internet of Things: how safe are your smart devices? - Spectator.co.uk - January 6th, 2020