BehavioSec has been selected by the leading US military research organization, DARPA (Defense Advanced Research Project Agency), to help them create the next generation of IT security which moves beyond todays password centric IT security. We here at BehavioSec wanted to let you know about a recent project we started with DARPA (Defense Advanced Research Project Agency). Active Authentication aims to identify the user based on continuously monitoring their keystrokes & mouse movements on a computer, rather than forcing complex passwords to increase security. This makes for a less intrusive security technology that is available today in our BehavioEnterprise product. This 3 year program will allow us to add to the body of public research, to help promote this intriguing area, to add to our own research base, and lean on the collective experience or our peers in both academia and industry that will ensure that our products and this technology continue to innovate. The project is known as BAA 12-06 Active Authentication, and the goal is to provide transparent security through existing technology such as keystrokes and mouse movements on future workstations. DARPA research points to the fact that it is inherently unnatural for humans to create, remember, and manage long complex passwords. “The authentication happens in the background – invisible to you – while you continue doing your work without interruptions”, says Mr. Richard Guidorizzi, DARPA Program Manager. DARPA is well known in the world of technology for their successful programs which have launched driverless vehicles, the internet, and GPS to name a few of their big achievements since 1958. “We are honored to partner with such as well recognized and proven research organization as DARPA. This program demonstrates that our work within continuous authentication using behavioral biometrics, will play a very prominent role in the future of IT security“, says Dr. Neil Costigan BehavioSec. The Active Authentication program is focused on standard workstations, but there are many other areas that could benefit from next generation of this security technology such as mobile devices and web security.