BehavioSec collaborates with the top financial institutions and technology leaders across the world to achieve integrity online with behaviour transformed to an additional security layer. Business drivers are to improve customer experience by real-time identity verification.
  • Automated fraud analytics

    Reduce manual review using an automated, adaptive, self-learning system.

  • Speed-up Alert investigations

    Reduce false positives by user behaviour of Who They Are NOT What device/Where they are.

  • Detect financial crime

    Incorporates cloud based anomaly detection and history of prior fraudulent users

  • Spot anomalies in real-time

    Behaviosec delivers a risk “score,” on behavioural biometrics and includes suggested risk levels to allow you to make decisions to block, flag or allow.

  • Understand the data

    An integral part of BehavioSec algorithm is an analysis of individual data attributes for each field entered.

  • Improve customer experience

    Make real-time, automated fraud decisions to reduce false positives and chargebacks.

EBA guidelines


Change management is always present in the digital financial ecosystem where innovations and regulations require organizations to be constantly updated. Our belief is that layers of security working together will be the winning strategy and one key factor is to turn the user experience into the best possible.

BehavioSec Web-shop Use Case in E-commerce

Case Study with an international payment company
A large international payment company decided to test BehavioSec’s technology in an e-commerce environment. The objective was to investigate BehavioSec’s technology and determine if it could transparently create a safer and more secure shopping environment on the web.

Over 150 individuals used the web shop with nearly 20,000 logins registered. Each simulated web-shop visit, the user was requested to verify the purchase, enter in a gift message, and then type in the checkout details.
BehavioSec takes advantage of the fact […]

DARPA presents: Continuous Mobile Authentication


BehavioSec has been awarded phase 2 research of the Active Authentication program.

Phase 2 is continuing the success of BehavioSec participation of phase 1 2012/2013. The phase 1 was researching modalities for Active Authentication based on behavioral biometrics on a workstation, finding patterns on how users interact by typing and mouse movements and applying that to a continuous feed. Think of it as working as normal it recognize that it is the correct user, however the software within a couple of seconds detects a false user taking […]

BehavioSec ActivID Authentication Server integration

HID Global Technology Partner Program

BehavioSec’s Behaviometric technology has been successfully integrated into the HID ActivID Authentication Server , adding another layer of security to the ActivID Threat detection service and strengthens one of the weakest links in today’s IT security solutions.

Benefits of BehavioSec Integration with ActivID Authentication Server

Improved user-experience by using the behavioral “fingerprint” as an authentication mechanism for step-up authentication or transaction approval. The additional layer of security is added in a completely transparent manner from the user perspective. Users will not be asked to re-authenticate if […]

DARPA: Active Authentication program


Our approach to continuously secure IT without prompting the user to authenticate has been given additional support by U.S. Defense Advanced Research Project Agency (DARPA). DARPA’s recent investment in their Active Authentication Project (BAA 12-06) points to the fact that it is inherently unnatural for humans to create, remember, and manage long complex passwords. “The authentication happens in the background – invisible to you – while you continue doing your work without interruptions.” – Mr. Richard Guidorizzi, DARPA Program Manager, Beyond Passwords. BehavioSec solutions […]

FFIEC compliance with Behaviometrics

Layered security is essential for web fraud detection
There is no silver bullet to solving the online authentication problem which is a well-known fact amongst practitioners,

Since virtually every authentication technique can be compromised, financial institutions should not rely solely on any single control for authorizing high risk transactions, but rather institute a system of layered security, as described herein.

The US Federal Financial Institutions Examinations Council (FFIEC) has released new guidelines for financial institutions called a Supplement to Authentication in an Internet Banking Environment. This is […]

Mobile banking and payments

With the increased usage of smart phones the rise in mobile banking and –payment solutions new authentication methods needs to be applied to further enhance the security to prevent fraud and protect from unauthorized usage.

Most enterprises currently limit the mobile application functionality available to customers to low-risk transactions. For example, most banks do not enable money transfers to first-time payees from mobile banking applications.1

Strong authentication of mobile users requires new methods, since most common strong authentication measures used for desktop or laptop computing do […]