Behavior ID - TeleSign · More cost effective for ... Behavior ID analyzes the behavior similarity...

2
KEY FEATURES COMBAT ACCOUNT TAKEOVER WITH CONTINUOUS PROTECTION Account takeover (ATO) occurs when unauthorized access is gained to Web or mobile app end-user accounts – often due to stolen credentials, weak passwords and bot-based attacks. ATO fraud is significant--an estimated $4.6 billion in direct financial loss occurs each year--– and every online account is susceptible, from bank and retail accounts to social media and email accounts. TeleSign Behavior ID provides an additional, transparent layer of security for every type of consumer online or mobile app account to protect against fraud, without the need for end-user interaction. Behavior ID Behavior ID A software development kit (SDK) that enables Web and mobile applications to measure and analyze a user’s behavioral biometrics in order to provide continuous authentication. Mobile SDKs CONTINUOUS AUTHENTICATION Behavior ID is always active and delivering continuous account protection, from initial login to account updates and specific transactions. The overall user experience is more streamlined and secure for good users, while incorrect, or malicious users are quickly blocked or challenged with re-verification or two-factor authentication. UNIQUE BEHAVIOR PROFILE Utilize the characteristics of users’ input and how they navigate through the interface to create virtual fingerprints of their behavior and determine variations that can flag user activity for re-verification. MEASURABLE BEHAVIORAL PATTERNS Continuously monitors and recognizes the identity of a user based on behavioral patterns, including a complex mix of mouse dynamics, keystroke dynamics, the users GUI interaction and advanced behavioral biometric algorithms. TRANSPARENT ENROLLMENT No user interaction is required to enroll, enable and start protecting an account from compromise. Users simply continue to interact with the Web or mobile application as normal; no change is required in their workflow or behavior.

Transcript of Behavior ID - TeleSign · More cost effective for ... Behavior ID analyzes the behavior similarity...

KEY FEATURES

COMBAT ACCOUNT TAKEOVER WITH CONTINUOUS PROTECTION Account takeover (ATO) occurs when unauthorized access is gained to Web or mobile app end-user accounts – often due to stolen credentials, weak passwords and bot-based attacks. ATO fraud is significant--an estimated $4.6 billion in direct financial loss occurs each year--– and every online account is susceptible, from bank and retail accounts to social media and email accounts. TeleSign Behavior ID provides an additional, transparent layer of security for every type of consumer online or mobile app account to protect against fraud, without the need for end-user interaction.

Behavior ID

Behavior IDA software development kit (SDK) that enables Web and mobile applications to measure and analyze a user’s behavioral biometrics in order to provide continuous authentication.

Mobile SDKs

CONTINUOUS AUTHENTICATIONBehavior ID is always active and delivering continuous account protection, from initial login to account updates and specific transactions. The overall user experience is more streamlined and secure for good users, while incorrect, or malicious users are quickly blocked or challenged with re-verification or two-factor authentication.

UNIQUE BEHAVIOR PROFILEUtilize the characteristics of users’ input and how they navigate through the interface to create virtual fingerprints of their behavior and determine variations that can flag user activity for re-verification.

MEASURABLE BEHAVIORAL PATTERNSContinuously monitors and recognizes the identity of a user based on behavioral patterns, including a complex mix of mouse dynamics, keystroke dynamics, the users GUI interaction and advanced behavioral biometric algorithms.

TRANSPARENT ENROLLMENTNo user interaction is required to enroll, enable and start protecting an account from compromise. Users simply continue to interact with the Web or mobile application as normal; no change is required in their workflow or behavior.

TeleSign is the leader in Mobile Identity solutions, helping customers secure more than 3.5 billion end user accounts worldwide and prevent registration fraud, while improving user experience and managing costs. TeleSign delivers account security and fraud prevention with two-factor authentication (2FA) based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data.

For more information, please visit www.telesign.com | @TeleSign

© 2016 TeleSign. All rights reserved. TeleSign, PhoneID, TeleBureau and others are trademarks of TeleSign Corporation. The TeleSign logo and other creative assets are owned and protected under copyright and/or trademark law.

HOW IT WORKS

Behavior ID

Mobile SDKs

BENEFITS

PDBI116

PREVENT ACCOUNT TAKEOVER

Establish and utilize a unique good user profile to prevent account takeover

attempts, even if a hacker is in possession of the correct

account credentials.

REDUCE END-USER FRICTION

Transparently produce a digital fingerprint from a

user’s behavior to confirm their identity and develop an ongoing authentication

without requiring the consumer to do anything.

DELIVER GREATER IDENTITY ASSURANCECollect, analyze, and rate

interactions to detect anomalies in user behavior

within seconds and stop fraudulent activity in

real-time.

LOWER COSTMore cost effective for companies than simply

issuing a verification challenge at every login.

Behavior ID delivers a “similarity score” and “confidence ratio” based on a set of behavioral biometric traits that are collected, analyzed and rated along the user journey, from initial account creation through ongoing access and usage of an account. Based on specific consumer logins and activity you choose to monitor, Behavior ID will rate the user’s current interactions against their profile and provide a recommended action to allow, challenge or block access to the account.

COLLECT BEHAVIORBy timing each key press and analyzing the timing deltas to subsequent key action (up & down) for each key pair, Behavior ID builds up a user profile that is used to monitor consistency.

ANALYZE DATAThrough the collected behavioral biometrics, Behavior ID analyzes the behavior similarity versus the normal usage patterns and attaches this statistical data to any transaction.

1

2

RATE ACTIVITYBehavior ID delivers a similarity score and confidence ratio, which provides knowledge to your decision engine to “allow,” “challenge” or “block” the user’s activity. If the rate score recommends a challenge, you can invoke a two-factor authentication event, such as sending a one-time passcode via SMS to the user’s phone number (provided at account registration).

3