Behavior biometrics - The silent revolution in digital fingerprinting

17
Behavior Biometrics The silent revolution in digital fingerprinting Rui Melo Biscaia Watchful Software

Transcript of Behavior biometrics - The silent revolution in digital fingerprinting

Page 1: Behavior biometrics - The silent revolution in digital fingerprinting

Behavior Biometrics The silent revolution in digital fingerprinting

Rui Melo BiscaiaWatchful Software

Page 2: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2

Some “house rules” on this Webinar

1 You are muted centrally. You don’t need to mute/unmute yourself

2This webinar is being recorded.You’ll have access to it on-demand on www.watchfulsoftware.com

3The Q&A session will be at the end.You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel

SpeakerRui Melo Biscaia

Director of Product Management & Strategic Accounts

Watchful Software

Page 3: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3

How secure are our Digital Identities?

Page 4: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4

How secure are our Digital Identities?

Page 5: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5

Behavior Biometrics in a nutshell

1 Monitors for identity theft attempts by means of analyzing typing patterns of users

2 Continually verifies users’ identities as they type during each windows session in an on-going basis

3 Requiring no hardware, is a software only solution, that understands who the user is in less than a tweet

4 Complements any Intrusion Detection System, or 2FA, by adding a behavior biometric layer

5 Works with any language, works with any app, works with any content

6 Runs in the background, transparent to the user, and never asking for dedicated text input

7 Delivers mitigation actions – Screenshot, Photo, Lock screen, E-mail, Text authentication screen, etc…

Page 6: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6

Behavior Biometrics - Use Cases

What if someone tries to impersonate me send emails or post on my behalf?

How can the system tackle it and prevent that from happening?

What if a student allows another person to take the exam once he/she has entered the login details?

How can the system identify that the student taking the exam is actually him/her and not someone else?

What if someone knows or steals your login credentials?

How can the system understand and react to the fact that that the person using the computer is not you?

Is someone else logged in my computer?

Is someone trying to impersonate me in

social media?Is someone cheating on this online exam?

Page 7: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7

Passive Enrollment and Dynamic Profiling

Page 8: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8

TypeWATCH is Behavior Biometrics

Page 9: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9

TypeWATCH: Product suite offer

4 Individuals WEB

To the enterprise Managed centrally Enforcement of

policies Security Roles &

Levels Monitor alarms User based

mitigation actions

Enterprise

Page 10: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10

TypeWATCH Enterprise

To the enterprise Managed centrally Enforcement of

policies Security Roles &

Levels Monitor alarms User based

mitigation actions

Enterprise

Page 11: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 11

TypeWATCH Enterprise

To the enterprise Managed centrally Enforcement of

policies Security Roles &

Levels Monitor alarms User based

mitigation actions

Enterprise

Page 12: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 12

TypeWATCH Enterprise

To the enterprise Managed centrally Enforcement of

policies Security Roles &

Levels Monitor alarms User based

mitigation actions

Enterprise

Page 13: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 13

TypeWATCH: Product suite offer

To end-users/mass market

Download and start using it. No server.

Freemium pricing model

Also used for POCs and demoing the product

4 Individuals WEBEnterprise

Page 14: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14

TypeWATCH for Individuals

To end-users/mass market

Download and start using it. No server.

Freemium pricing model

Also used for POCs and demoing the product

4 Individuals

Page 15: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15

TypeWATCH: Product suite offer

To the enterprise providing web-based services

Does not require a client agent to be installed

Applies to a website or web platform

4 Individuals WEBEnterprise

Page 16: Behavior biometrics - The silent revolution in digital fingerprinting

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16

6 (tech) reasons why TypeWATCH

Precise Delivers 98% plus accuracy and makes it virtually impossible to mimic another person's typing pattern

Persistent Constantly assesses typing samples against a legitimate user’s stored dynamic pattern

DynamicOffsets tiredness, switching and or sharing of computers / keyboards, mood, influence of alcohol and medications, etc, and sets individual thresholds to every user to increase performance

Simple There is no special hardware needed as with other biometrics – a standard keyboard is sufficient

Safe Data verification is provided between the input (keyboard) to the matching algorithm (even with remote desktop typing)

Auditable An intruder can be identified by means of matching the typing sample against the profile database.

Page 17: Behavior biometrics - The silent revolution in digital fingerprinting

Behavior Biometrics The silent revolution in digital fingerprinting

Rui Melo BiscaiaWatchful Software