Telesign impermium webinar deck-121312

Post on 13-May-2015

149 views 8 download

Tags:

description

Impermium has teamed with TeleSign to bring best-of-class telephone-based validation to the site integrity process. With TeleSign, suspicious customers are routed through a simple, user-friendly verification process, ensuring legitimate users move through while fraudsters and criminals stay out. In conjunction with the Impermium real-time threat detection capabilities and global threat network, site owners can control how tightly to lock down their site, balancing a great experience for trustworthy users with an impenetrable one for the bad guys. The combined solution allows administrators to rest assured that transactions such as registration, commenting, and login are safe and secure, with a minimum of inconvenience to users and the business.

Transcript of Telesign impermium webinar deck-121312

TeleSignIn Partnership with Impermium

Presents:

Live Webinar:Stop Social Spam

WHAT WE DO ‣ Two-Factor Authentication‣ Phone-based Verification

(SMS/ Voice)‣ Intelligent Data (Phone type,

Device status, etc.

ABOUT US: TeleSign is the global leader in Intelligent Authentication providing actionable data to secure online transactions, reduce fraud, and improve the end-user experience.

Forrest HobbsVice President TeleSign

ABOUT US: Impermium provides robust security for web sites and social networks, leveraging user reputation to defend against social spam, account compromise, transaction fraud, and abuse.

WHAT WE DO ‣ Real-time threat analysis‣ Behavioral anomaly detection‣ Social user reputation‣ Malicious content protection

Mark RisherCEOImpermium

Dear Sir or Madam:

I bid you to happiness to yourself

and to your own family in this day.

It is my ESTEEMED PLEASURE to be

presenting to you the sum total of

$1.000,40,000 UNITED STATES DOLLARS

(USD) from His Royal High Holiness,

the Esteemed Minister of Treasury

for the Oil Ministry of our country…

5

2005 2006 2007 2008 2009 2010 2011

Social Media has Eclipsed Email(for good users and bad)

Social media

email

Agenda

6

Anatomy of the Attacks

Risks and Impact

Three-Step Approach to Mitigation

Wherever the Eyeballs Are

7

Blog posts

Chat Messages

Reviews & listings

Discussion forum threads

Message board posts

Direct Messages

Comments

URL & link submissions

Fraudulent user signups

Varieties of Social Spam

8

Malicious Content

Policy Abuse

Commercial Content

Malware Placement Aids Propagation

9

Novel Sites & Links are Commonplace

10

Acct. Compromise: Reputation Hijacking

11

Acct. Compromise: Reputation Hijacking

12

Social much more “viral” than email

250:113

Fraudsters Walk in the Front Door

14

Bulk Accounts on the Open Market

15

Malicious Content Repels Good Users

16

$#*!&!

Icons copyright © http://deleket.deviantart.com

• Engagement• Loyalty• Pageviews• Brand Reputation

Indirect Effects Compounded

17

Lost Advertising Revenue

PageRank and SEO

Manual Review Costs

Unreliable Site Metrics

3-Step Approach

Block Bogus Accounts

Stop Spam & Malicious Content

Prevent Account Hijacking

Block Bogus Accounts

Telephone Verification

RegistrationCapture phone number

AnalysisPhone TypeDevice/Subs StatusPast behavior

Accept

Deny

Flag

Phone VerifyEnsure phone number is valid & reachable

Account Creation

Reject Registration

Certain phone types are more likely to be associated with online fraud and considered higher risk.

Importance of Phone Type

TeleSign Verify is a quick and simple way to prevent online fraud and social spam by identifying legitimate users using their phone

User enters phone number on website and clicks “submit”

User receives verification code on cell phone or landline

User logs in by entering the verification code onto the website

How Verification Works

Stop Spam & Malicious Content

• Active Moderation• Trained staff reviews/approves content• Scale & consistency challenges

• Community Feedback• Cost-effective• Punishes most loyal users• Trailing indicator

• Invitation-Only• Reduces engagement• Anti-Social

• Individual Banning• Whack-a-mole

22

Stop Spam & Malicious Content

Content analysis

23

Behavioral anomaly detection

Continuous user reputation

Stop Spam & Malicious Content

‣ Bullying, insults and threats

‣ Suspicious signups‣ Repeat offenders‣ Malicious content‣ Signs of account

compromise

‣ High-risk phone type‣ Name/address tied to

account‣ Device or subscriber

status‣ Phone risk score

Use these in conjunction to keep your house clean:

Phone Verify User

Allow

Flag

Deny

Activity Phone Signals

Stop Spam & Malicious Content

Impermium Human Moderation

Time to process 19 seconds 2-3 days

Accuracy 99.5% 95%

False Positives 4 79

10,000 Comments

Protect legitimate account owners from account takeover with two-factor authentication in the following scenarios:

Prevent Account Hijacking

Key changes to account information

Unrecognized device or IP address

Unusual activity

Telephone Verification

Risk-Based Authentication Two-factor auth. Account changes Password resets

Accept Change

Reject Change

Phone VerifyUse 2FA to ensure that account changes are legitimate

Prevent Account Hijacking

SPECIAL REPORT Complete our post-webinar survey and we’ll send you a copy of our report.

SPECIAL OFFER:Sign up by 12/31/12 and get 50% off your first THREE MONTHS of service.*

Special Webinar Offers

* Limitations apply.

TAKE 50% OFFyour first 3 months of services

Thank you.

Have questions?

Email us at

learnmore@telesign.com