InAuth specialises in mobile and browser authentication and fraud / malware detection for Financial Services and Online Retailers. Amongst it's products are Dynamic and Persistent ID, deep location lookup, malware and crimeware detection, root detection and fuzzy device fingerprinting.
2. InAuth, Inc.
2
InAuth Corporate Overview
InAuth has deep roots in the mobile space, as well as strong Financial Services, Risk, Fraud, and
Device Identification and Intelligence coverage. We are a privately-held software company, full of
engineers and developers backed by very successful former bankers and entrepreneurs. Our sole
focus is security for financial services and alternative payment providers.
InAuth meets and exceeds authentication and layered security guidelines set forth by
regulators/agencies including the Federal Financial Institutions Examination Council (FFIEC).
InAuth delivers a user-friendly secure transaction environment to the financial services and mobile
transaction markets with our suite of PC/mobile browser fingerprinting/fraud detection and mobile
security modules (SDKâs) that are integrated with the downloadable mobile applications and work
with our Risk Engine and Case Management System within our Security Platform.
The InAuth system may snap into the existing systems or risk management tools (such as RSA,
Actimize or others) both seamlessly and transparently.
3. Trends
o Security breaches via malware
and bots are more frequent,
bigger and national news -
Target, Neimans, etc.
o Consumers have and are
continuing to shift toward
mobile devices and mobile apps
o Mobile can be the weakest link,
presenting substantial exposure
to fraud.
3
The Problem
âą Mobile devices subvert controls
that are relied on in the browser-
based online world, namely IP
addressâŠwhich does not yield
results in mobile apps.
âą Mobile malware via phishing and
SMSishing is proliferating and
difficult to spot due to screen size
& limited info. Open platforms
such as Android are particularly
vulnerable.
âą New capabilities due to customer
demand, remote deposit capture
& mobile payments bring new
attack vectors. As more risky
transactions are enabled, better
mobile centric security is critical.
4. Value Proposition
4
ïČ Increased Revenue - approve more transactions with high degree of
confidence
ïČ Enhanced Decisioning - increased visibility to the device provides for richer
data for better risk decisions
ïČ Increased Security Measures â providing more granular device details,
(browser or mobile) not available with other solutions, will help to determine
the identity and assist in determining the riskiness of the transaction
ïČ Brand Protection â no disruption to the customer experience - reducing the
challenge rate and creating a stronger customer relationship
ïČ MinimizeOperating costs â reduce rejects and outsorts enables for
investigation on only the riskiest transactions
5. Benefits
5
ïČ True Mobile Identity Data (Persistent Identifier)
ïČ Unprecedented visibility to device data
ïČ Trusted (cross-checked) location data
ïČ Accelerate time to detection with more precise data points
ïČ PIN & Reputation Protection (Advanced Root & Crimeware Detect)
ïČ Ability to write more & better rules (more data delivered)
ïČ Lower collision rates (more accurate browser print)