SlideShare une entreprise Scribd logo
1  sur  26
Frictionless Authentication 
and Advanced Threats Detection 
Benny Rosenbaum | CEO 
1 Confidential , not for distribution
Agenda 
 Introduction 
 What is BioCatch? 
 Product Details 
 Summary 
2 Confidential , not for distribution
Who are we? 
Israeli-based 
company 
(RSA, Trusteer, 
Israeli defense 
forces veterans) 
Gartner 
Cool 
Vendor 
2013 
Installed in 
US/Canada 
banks 
3 Confidential , not for distribution 
Our 
technology: 
Cognitive 
Behavioral 
Analytics 
Authenticates the user 
in online/mobile 
banking 
Catches MITB, Remote 
Access Trojans (RATs) 
in the act 
Offering 
quick-ROI 
Deployment
What’s special about BioCatch? 
Analysis by Avivah Litan 
“Why Cool: BioCatch provides invisible, continuous biometric 
authentication Gartner Cool Vendor of 2013 
a user on a PC or mobile application by using a novel 
technology that goes beyond the current approaches of monitoring 
keystroke dynamics, mouse movements, speed patterns and other 
physical actions“. 
4 Confidential , not for distribution
What business do we solve? 
Friction 
OTP 
123456 
123456 
We’re able to strongly authenticate 
without a friction cost 
5 Confidential , not for distribution 
SMS 
One time codes 
Smart Card 
Readers 
Tokens
What business do we solve? 
Fraud operations cost 
MITB (Man in the Browser) 
We’re able to accurately catch MITB, 
RAT live attacks in the act 
6 Confidential , not for distribution
The Science Behind BioCatch 
Neural Motor Control 
Or: how does our brain control movement? 
It involves: 
Information Processing 
Coordination 
Mechanics 
Physics 
Cognition 
7 Confidential , not for distribution 
-0.05 
-0.1 
-0.15 
-0.2 
-0.25 
-0.3 
-0.35 
-0.4 
-0.45 
-0.5 
-0.55 
-0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 
βx 
βy
Our Innovative Twist 
Invisible Challenges 
Or: how can we accelerate learning and detection? 
8 Confidential , not for distribution
Use case and demo 
9 Confidential , not for distribution 
Mobile 2FA 
(various designs) 
PC/Mobile Invisible
Triggering a Response | Pro-Active 
Example 
Say you’re using a mobile app, 
and drag an item to the right. 
10 Confidential , not for distribution 
Now say we introduce a subtle challenge… 
A 5° rotation to your move. 
This is what would happen if you don’t 
offset the rotation: you’ll end up a bit off 
target… 
But your brain won’t let this 
happen. You will spontaneously 
start correcting as soon as your 
mind picks up the off-target 
move, because your brain will 
work on completing the task. 
You won’t sense any change to 
the user experience, as it’s a 
low-volume effect (our research 
team tests it scientifically). 
And here’s the beauty of the BioCatch 
approach: 
Different people respond differently. 
Left: sharp, single correction (red) 
Right: complex, multiple corrections (blue) 
Colin | Fraud Director Shanee | QA Manager
The tall guy 
How do you hold the device? What happens when you tap it 
11 Confidential , not for distribution 
Meet Alon, our 6’7” tall iOS developer. 
When he thumps the device, it’s very 
visible (blue spike) 
Red/Green: x-y movement of device 
Blue: vertical movement (up/down)
Acceleration Patterns | Passive 
Example 
When moving mouse to the right, how fast do you ‘close loops’? 
 Very high in all 
moves 
 Very slow in 
short moves 
 Moderate in 
long moves 
12 Confidential , not for distribution
Selection wheel 
One small element… And we can learn so much 
Passive traits: 
 Rotation speed 
 Cognitive choice: what 
do you spin first? 
 # of corrections at the 
end of spin 
 Final selection strategy 
(tap vs. spin) 
13 Confidential , not for distribution 
Pro-active, 
subtle challenges: 
 Slight Increase / 
Decrease Rotation speed 
 Slight change of speed 
during correction spins 
 Various small effects 
during final selection
Benefits over traditional behavioral 
analytics 
Property BioCatch Passive Behavioural 
a a 
Behavioural Parameters + + 
a 
Cognitive Parameters + - 
X 
Device Dependency Low High 
Time for building profile Short Long 
Excel at Free Form Usage 
a 
a 
14 Confidential , not for distribution 
Repeat Tasks (e.g. 
password, PIN typing) 
X 
Remote Access Detection + - 
X 
No Reply Attacks + -
CyberCatch deployment 
Top 10 Canadian Bank 
 Objective: reduce friction of High Risk 
 .2,000,000 Users of online banking since Sep 15th 
 30% access from tablets 
 Up and running in 5 days (2 days JS Integration+3 days QA) 
 3-month learning, 3-month operation 
Top 50 US bank 
 .500,000 Users of online banking 
 Finished testing 
15 Confidential , not for distribution
Our Project Heatmap 
Consumer Commercial 
Online 
Mobile 
Authentication 
Threat Detection 
Cognitive 
Behavioral 
Analysis 
16 Confidential , not for distribution
Technology & Deployment 
Q&A 
17 Confidential , not for distribution
Product Overview 
BioCatch for Web 
• Biometric Frictionless 
Authentication 
• RAT Detection 
• MitB Detection 
18 Confidential , not for distribution 
BioCatch for Mobile 
• Biometric Frictionless 
Authentication (Touch) 
• Multi-Factor Authentication 
Cognitive Behavioral Analytics Platform 
• BioCatch Management Application 
• BioCatch Integration Tools 
• BioCatch Rule/Alert Setting Tool (Roadmap) 
• BioCatch Visualizer Tool (Roadmap)
Online fraud detection 
Risk Alerts 
Session Data 
19 Confidential , not for distribution 
Management 
Application 
Fraud 
Team 
Bank’s Risk 
Engine 
BANK 
BioCatch 
Engine 
User Behavior 
(>350 Params) 
Frictionless 
Challenges 
JavaScript SDK 
Online Banking 
Payee 
Amount 
Mobile 
Banking 
Payee 
Amount
BioCatch Application Management 
20 Confidential , not for distribution
Online Banking Fraud Detection 
Detecting Man-in-the-Browser Attacks 
Human-in-the-Middle 
21 Confidential , not for distribution 
James 1st session 
James 2st session 
Automated Transactions (MitB) 
Time User Transaction 
10:22 FBorn None 
10:22 FGreen Add Payee 
10:26 JamesL Wire Transfer 
10:31 LinaP Wire Transfer
Product Overview 
Detecting Remote Access Sessions 
Fraudster's Computer Genuine User’s Computer 
22 Confidential , not for distribution 
RAT
Product Overview 
VS other Fraud Detection Approaches 
Cognitive Behavior 
“Genuine?” 
“Human?” 
“Remote?” 
Application 
Data 
“New Payee?” 
“Suspicious Navigation?” 
“High Amount?” 
23 Confidential , not for distribution 
Device 
Attributes 
“Known Device?” 
“Infected Device?” 
“Device IP Geo Location?” 
Fraud 
Detection 
Approaches
Product overview 
Less high risk Less fraud 
Risk Engine 
Application data? 
Device 
attributes? 
High Risk 
Transactions 
4%-8% 
Cognitive 
Behavior? 
>0.8% 
24 Confidential , not for distribution
BioCatch Product overview 
Integration tools 
Receive Alerts & Behavioral Data from BioCatch 
 Alerts - eMail, JavaScript 
 Alert + Data - Flat Files, API (web Service) 
Send BioCatch Fraud Feedback/ Whitelisting & Activity Data 
 Fraud Feedback/Whitelisting - BioCatch Management 
Application, Flat Files 
 Activity Data (for MitB detection) – API, Flat Files 
25 Confidential , not for distribution
Thank you! 
To learn more: www.biocatch.com 
26 Confidential , not for distribution

Contenu connexe

Tendances

The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...Alan McSweeney
 
How to be a Successful Data PM by Zillow Product Leaders
How to be a Successful Data PM by Zillow Product LeadersHow to be a Successful Data PM by Zillow Product Leaders
How to be a Successful Data PM by Zillow Product LeadersProduct School
 
How to Design UX for AI by Zillow Principal PM
How to Design UX for AI by Zillow Principal PMHow to Design UX for AI by Zillow Principal PM
How to Design UX for AI by Zillow Principal PMProduct School
 
A Practical Guide to Scaling Agile
A Practical Guide to Scaling AgileA Practical Guide to Scaling Agile
A Practical Guide to Scaling AgileMariya Breyter
 
How to Build a Product Vision by Spotify Product Manager
How to Build a Product Vision by Spotify Product ManagerHow to Build a Product Vision by Spotify Product Manager
How to Build a Product Vision by Spotify Product ManagerProduct School
 
Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...
Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...
Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...Product School
 
How to Build a Robust Product Roadmap by Salesforce VP of Product
How to Build a Robust Product Roadmap by Salesforce VP of ProductHow to Build a Robust Product Roadmap by Salesforce VP of Product
How to Build a Robust Product Roadmap by Salesforce VP of ProductProduct School
 
Solution Architecture and Solution Complexity
Solution Architecture and Solution ComplexitySolution Architecture and Solution Complexity
Solution Architecture and Solution ComplexityAlan McSweeney
 
Evidenced based management - Presentation at Scrum Australia 24 oct 2018
Evidenced based management - Presentation at Scrum Australia 24 oct 2018Evidenced based management - Presentation at Scrum Australia 24 oct 2018
Evidenced based management - Presentation at Scrum Australia 24 oct 2018Mia Horrigan
 
Wissensmanagement bei Volkswagen
Wissensmanagement bei VolkswagenWissensmanagement bei Volkswagen
Wissensmanagement bei VolkswagenGFU Cyrus AG
 
The 60 Second Business Case
The 60 Second Business CaseThe 60 Second Business Case
The 60 Second Business CaseJason Brett
 
Product Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization TechniquesProduct Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization TechniquesVikash Karuna
 
Agile2016: Intro to Agile Product Management
Agile2016: Intro to Agile Product ManagementAgile2016: Intro to Agile Product Management
Agile2016: Intro to Agile Product ManagementRich Mironov
 
Smooth Collaboration With UX Designers by Zalando Sr PM
Smooth Collaboration With UX Designers by Zalando Sr PMSmooth Collaboration With UX Designers by Zalando Sr PM
Smooth Collaboration With UX Designers by Zalando Sr PMProduct School
 
Building Better Tech: The Product Manager's Role in Infrastructure & Platform...
Building Better Tech: The Product Manager's Role in Infrastructure & Platform...Building Better Tech: The Product Manager's Role in Infrastructure & Platform...
Building Better Tech: The Product Manager's Role in Infrastructure & Platform...Product School
 
Agile Coaching Workshop
Agile Coaching WorkshopAgile Coaching Workshop
Agile Coaching WorkshopCraig Smith
 
AI in Action The New Age of Intelligent Products and Sales Automation
AI in Action The New Age of Intelligent Products and Sales AutomationAI in Action The New Age of Intelligent Products and Sales Automation
AI in Action The New Age of Intelligent Products and Sales AutomationProduct School
 
The Analytics CoE: Positioning your Business Analytics Program for Success
The Analytics CoE: Positioning your Business Analytics Program for SuccessThe Analytics CoE: Positioning your Business Analytics Program for Success
The Analytics CoE: Positioning your Business Analytics Program for SuccessCartegraph
 

Tendances (20)

The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...
 
How to be a Successful Data PM by Zillow Product Leaders
How to be a Successful Data PM by Zillow Product LeadersHow to be a Successful Data PM by Zillow Product Leaders
How to be a Successful Data PM by Zillow Product Leaders
 
Build your content strategy roadmap
Build your content strategy roadmapBuild your content strategy roadmap
Build your content strategy roadmap
 
How to Design UX for AI by Zillow Principal PM
How to Design UX for AI by Zillow Principal PMHow to Design UX for AI by Zillow Principal PM
How to Design UX for AI by Zillow Principal PM
 
A Practical Guide to Scaling Agile
A Practical Guide to Scaling AgileA Practical Guide to Scaling Agile
A Practical Guide to Scaling Agile
 
How to Build a Product Vision by Spotify Product Manager
How to Build a Product Vision by Spotify Product ManagerHow to Build a Product Vision by Spotify Product Manager
How to Build a Product Vision by Spotify Product Manager
 
Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...
Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...
Revolutionizing the Customer Experience_ Innovating and Scaling within Enterp...
 
How to Build a Robust Product Roadmap by Salesforce VP of Product
How to Build a Robust Product Roadmap by Salesforce VP of ProductHow to Build a Robust Product Roadmap by Salesforce VP of Product
How to Build a Robust Product Roadmap by Salesforce VP of Product
 
Solution Architecture and Solution Complexity
Solution Architecture and Solution ComplexitySolution Architecture and Solution Complexity
Solution Architecture and Solution Complexity
 
Evidenced based management - Presentation at Scrum Australia 24 oct 2018
Evidenced based management - Presentation at Scrum Australia 24 oct 2018Evidenced based management - Presentation at Scrum Australia 24 oct 2018
Evidenced based management - Presentation at Scrum Australia 24 oct 2018
 
Wissensmanagement bei Volkswagen
Wissensmanagement bei VolkswagenWissensmanagement bei Volkswagen
Wissensmanagement bei Volkswagen
 
The 60 Second Business Case
The 60 Second Business CaseThe 60 Second Business Case
The 60 Second Business Case
 
Product Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization TechniquesProduct Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization Techniques
 
Go Jira
Go JiraGo Jira
Go Jira
 
Agile2016: Intro to Agile Product Management
Agile2016: Intro to Agile Product ManagementAgile2016: Intro to Agile Product Management
Agile2016: Intro to Agile Product Management
 
Smooth Collaboration With UX Designers by Zalando Sr PM
Smooth Collaboration With UX Designers by Zalando Sr PMSmooth Collaboration With UX Designers by Zalando Sr PM
Smooth Collaboration With UX Designers by Zalando Sr PM
 
Building Better Tech: The Product Manager's Role in Infrastructure & Platform...
Building Better Tech: The Product Manager's Role in Infrastructure & Platform...Building Better Tech: The Product Manager's Role in Infrastructure & Platform...
Building Better Tech: The Product Manager's Role in Infrastructure & Platform...
 
Agile Coaching Workshop
Agile Coaching WorkshopAgile Coaching Workshop
Agile Coaching Workshop
 
AI in Action The New Age of Intelligent Products and Sales Automation
AI in Action The New Age of Intelligent Products and Sales AutomationAI in Action The New Age of Intelligent Products and Sales Automation
AI in Action The New Age of Intelligent Products and Sales Automation
 
The Analytics CoE: Positioning your Business Analytics Program for Success
The Analytics CoE: Positioning your Business Analytics Program for SuccessThe Analytics CoE: Positioning your Business Analytics Program for Success
The Analytics CoE: Positioning your Business Analytics Program for Success
 

En vedette

Fraudsters
FraudstersFraudsters
FraudstersYanivt
 
Cyber attacks september 2014
Cyber attacks september 2014Cyber attacks september 2014
Cyber attacks september 2014Yanivt
 
Epoint agro ppt
Epoint agro pptEpoint agro ppt
Epoint agro pptYanivt
 
It's the wild west out there infographic
It's the wild west out there   infographicIt's the wild west out there   infographic
It's the wild west out there infographicYanivt
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationYanivt
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNYanivt
 
JustAd
JustAdJustAd
JustAdYanivt
 

En vedette (10)

Fraudsters
FraudstersFraudsters
Fraudsters
 
Cyber attacks september 2014
Cyber attacks september 2014Cyber attacks september 2014
Cyber attacks september 2014
 
Epoint agro ppt
Epoint agro pptEpoint agro ppt
Epoint agro ppt
 
It's the wild west out there infographic
It's the wild west out there   infographicIt's the wild west out there   infographic
It's the wild west out there infographic
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate Presentation
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTN
 
JustAd
JustAdJustAd
JustAd
 

Similaire à Bio catch

How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfront2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfrontEric Ries
 
Lean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric RiesLean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric RiesWealthfront
 
2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true ventures2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true venturesEric Ries
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 Great Bay Software
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
DutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesDutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesBigML, Inc
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint SecurityAdrian Sanabria
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooAlex Stamos
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access ControlMd. Saddam Hossain Noyon
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsOz Forensics
 

Similaire à Bio catch (20)

How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfront2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfront
 
Lean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric RiesLean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric Ries
 
2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true ventures2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true ventures
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
DutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesDutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective Anomalies
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Better fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergyBetter fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergy
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
 

Dernier

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Dernier (11)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Bio catch

  • 1. Frictionless Authentication and Advanced Threats Detection Benny Rosenbaum | CEO 1 Confidential , not for distribution
  • 2. Agenda  Introduction  What is BioCatch?  Product Details  Summary 2 Confidential , not for distribution
  • 3. Who are we? Israeli-based company (RSA, Trusteer, Israeli defense forces veterans) Gartner Cool Vendor 2013 Installed in US/Canada banks 3 Confidential , not for distribution Our technology: Cognitive Behavioral Analytics Authenticates the user in online/mobile banking Catches MITB, Remote Access Trojans (RATs) in the act Offering quick-ROI Deployment
  • 4. What’s special about BioCatch? Analysis by Avivah Litan “Why Cool: BioCatch provides invisible, continuous biometric authentication Gartner Cool Vendor of 2013 a user on a PC or mobile application by using a novel technology that goes beyond the current approaches of monitoring keystroke dynamics, mouse movements, speed patterns and other physical actions“. 4 Confidential , not for distribution
  • 5. What business do we solve? Friction OTP 123456 123456 We’re able to strongly authenticate without a friction cost 5 Confidential , not for distribution SMS One time codes Smart Card Readers Tokens
  • 6. What business do we solve? Fraud operations cost MITB (Man in the Browser) We’re able to accurately catch MITB, RAT live attacks in the act 6 Confidential , not for distribution
  • 7. The Science Behind BioCatch Neural Motor Control Or: how does our brain control movement? It involves: Information Processing Coordination Mechanics Physics Cognition 7 Confidential , not for distribution -0.05 -0.1 -0.15 -0.2 -0.25 -0.3 -0.35 -0.4 -0.45 -0.5 -0.55 -0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 βx βy
  • 8. Our Innovative Twist Invisible Challenges Or: how can we accelerate learning and detection? 8 Confidential , not for distribution
  • 9. Use case and demo 9 Confidential , not for distribution Mobile 2FA (various designs) PC/Mobile Invisible
  • 10. Triggering a Response | Pro-Active Example Say you’re using a mobile app, and drag an item to the right. 10 Confidential , not for distribution Now say we introduce a subtle challenge… A 5° rotation to your move. This is what would happen if you don’t offset the rotation: you’ll end up a bit off target… But your brain won’t let this happen. You will spontaneously start correcting as soon as your mind picks up the off-target move, because your brain will work on completing the task. You won’t sense any change to the user experience, as it’s a low-volume effect (our research team tests it scientifically). And here’s the beauty of the BioCatch approach: Different people respond differently. Left: sharp, single correction (red) Right: complex, multiple corrections (blue) Colin | Fraud Director Shanee | QA Manager
  • 11. The tall guy How do you hold the device? What happens when you tap it 11 Confidential , not for distribution Meet Alon, our 6’7” tall iOS developer. When he thumps the device, it’s very visible (blue spike) Red/Green: x-y movement of device Blue: vertical movement (up/down)
  • 12. Acceleration Patterns | Passive Example When moving mouse to the right, how fast do you ‘close loops’?  Very high in all moves  Very slow in short moves  Moderate in long moves 12 Confidential , not for distribution
  • 13. Selection wheel One small element… And we can learn so much Passive traits:  Rotation speed  Cognitive choice: what do you spin first?  # of corrections at the end of spin  Final selection strategy (tap vs. spin) 13 Confidential , not for distribution Pro-active, subtle challenges:  Slight Increase / Decrease Rotation speed  Slight change of speed during correction spins  Various small effects during final selection
  • 14. Benefits over traditional behavioral analytics Property BioCatch Passive Behavioural a a Behavioural Parameters + + a Cognitive Parameters + - X Device Dependency Low High Time for building profile Short Long Excel at Free Form Usage a a 14 Confidential , not for distribution Repeat Tasks (e.g. password, PIN typing) X Remote Access Detection + - X No Reply Attacks + -
  • 15. CyberCatch deployment Top 10 Canadian Bank  Objective: reduce friction of High Risk  .2,000,000 Users of online banking since Sep 15th  30% access from tablets  Up and running in 5 days (2 days JS Integration+3 days QA)  3-month learning, 3-month operation Top 50 US bank  .500,000 Users of online banking  Finished testing 15 Confidential , not for distribution
  • 16. Our Project Heatmap Consumer Commercial Online Mobile Authentication Threat Detection Cognitive Behavioral Analysis 16 Confidential , not for distribution
  • 17. Technology & Deployment Q&A 17 Confidential , not for distribution
  • 18. Product Overview BioCatch for Web • Biometric Frictionless Authentication • RAT Detection • MitB Detection 18 Confidential , not for distribution BioCatch for Mobile • Biometric Frictionless Authentication (Touch) • Multi-Factor Authentication Cognitive Behavioral Analytics Platform • BioCatch Management Application • BioCatch Integration Tools • BioCatch Rule/Alert Setting Tool (Roadmap) • BioCatch Visualizer Tool (Roadmap)
  • 19. Online fraud detection Risk Alerts Session Data 19 Confidential , not for distribution Management Application Fraud Team Bank’s Risk Engine BANK BioCatch Engine User Behavior (>350 Params) Frictionless Challenges JavaScript SDK Online Banking Payee Amount Mobile Banking Payee Amount
  • 20. BioCatch Application Management 20 Confidential , not for distribution
  • 21. Online Banking Fraud Detection Detecting Man-in-the-Browser Attacks Human-in-the-Middle 21 Confidential , not for distribution James 1st session James 2st session Automated Transactions (MitB) Time User Transaction 10:22 FBorn None 10:22 FGreen Add Payee 10:26 JamesL Wire Transfer 10:31 LinaP Wire Transfer
  • 22. Product Overview Detecting Remote Access Sessions Fraudster's Computer Genuine User’s Computer 22 Confidential , not for distribution RAT
  • 23. Product Overview VS other Fraud Detection Approaches Cognitive Behavior “Genuine?” “Human?” “Remote?” Application Data “New Payee?” “Suspicious Navigation?” “High Amount?” 23 Confidential , not for distribution Device Attributes “Known Device?” “Infected Device?” “Device IP Geo Location?” Fraud Detection Approaches
  • 24. Product overview Less high risk Less fraud Risk Engine Application data? Device attributes? High Risk Transactions 4%-8% Cognitive Behavior? >0.8% 24 Confidential , not for distribution
  • 25. BioCatch Product overview Integration tools Receive Alerts & Behavioral Data from BioCatch  Alerts - eMail, JavaScript  Alert + Data - Flat Files, API (web Service) Send BioCatch Fraud Feedback/ Whitelisting & Activity Data  Fraud Feedback/Whitelisting - BioCatch Management Application, Flat Files  Activity Data (for MitB detection) – API, Flat Files 25 Confidential , not for distribution
  • 26. Thank you! To learn more: www.biocatch.com 26 Confidential , not for distribution