BehavioSec has joined Samsung Enterprise Alliance Program.
“Even though Samsung and BehavioSec have delivered security applications for mobile together before this is yet another step in the right direction.” Says Neil Costigan BehavioSec CEO
Case Study with an international payment company
A large international payment company decided to test BehavioSec’s technology in an e-commerce environment. The objective was to investigate BehavioSec’s technology and determine if it could transparently create a safer and more secure shopping environment on the web.
Over 150 individuals used the web shop with nearly 20,000 logins registered. Each simulated web-shop visit, the user was requested to verify the purchase, enter in a gift message, and then type in the checkout details.
BehavioSec takes advantage of the fact […]
Danske Bank is well known for providing their customers with great user experience. In their effort to further constantly challenge and increase user experience, they began moving into easy-to-handle strong security unified across platforms and devices.
BehavioSec has been awarded phase 2 research of the Active Authentication program.
Phase 2 is continuing the success of BehavioSec participation of phase 1 2012/2013. The phase 1 was researching modalities for Active Authentication based on behavioral biometrics on a workstation, finding patterns on how users interact by typing and mouse movements and applying that to a continuous feed. Think of it as working as normal it recognize that it is the correct user, however the software within a couple of seconds detects a false user taking […]
HID Global Technology Partner Program
BehavioSec’s Behaviometric technology has been successfully integrated into the HID ActivID Authentication Server , adding another layer of security to the ActivID Threat detection service and strengthens one of the weakest links in today’s IT security solutions.
Benefits of BehavioSec Integration with ActivID Authentication Server
Improved user-experience by using the behavioral “fingerprint” as an authentication mechanism for step-up authentication or transaction approval. The additional layer of security is added in a completely transparent manner from the user perspective. Users will not be asked to re-authenticate if […]
Our approach to continuously secure IT without prompting the user to authenticate has been given additional support by U.S. Defense Advanced Research Project Agency (DARPA). DARPA’s recent investment in their Active Authentication Project (BAA 12-06) points to the fact that it is inherently unnatural for humans to create, remember, and manage long complex passwords. “The authentication happens in the background – invisible to you – while you continue doing your work without interruptions.” – Mr. Richard Guidorizzi, DARPA Program Manager, Beyond Passwords. BehavioSec solutions […]
Layered security is essential for web fraud detection
There is no silver bullet to solving the online authentication problem which is a well-known fact amongst practitioners,
Since virtually every authentication technique can be compromised, financial institutions should not rely solely on any single control for authorizing high risk transactions, but rather institute a system of layered security, as described herein.
The US Federal Financial Institutions Examinations Council (FFIEC) has released new guidelines for financial institutions called a Supplement to Authentication in an Internet Banking Environment. This is […]
With the increased usage of smart phones the rise in mobile banking and –payment solutions new authentication methods needs to be applied to further enhance the security to prevent fraud and protect from unauthorized usage.
Most enterprises currently limit the mobile application functionality available to customers to low-risk transactions. For example, most banks do not enable money transfers to first-time payees from mobile banking applications.1
Strong authentication of mobile users requires new methods, since most common strong authentication measures used for desktop or laptop computing do […]