SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Frictionless Authentication 
and Advanced Threats Detection 
Benny Rosenbaum | CEO 
1 Confidential , not for distribution
Agenda 
 Introduction 
 What is BioCatch? 
 Product Details 
 Summary 
2 Confidential , not for distribution
Who are we? 
Israeli-based 
company 
(RSA, Trusteer, 
Israeli defense 
forces veterans) 
Gartner 
Cool 
Vendor 
2013 
Installed in 
US/Canada 
banks 
3 Confidential , not for distribution 
Our 
technology: 
Cognitive 
Behavioral 
Analytics 
Authenticates the user 
in online/mobile 
banking 
Catches MITB, Remote 
Access Trojans (RATs) 
in the act 
Offering 
quick-ROI 
Deployment
What’s special about BioCatch? 
Analysis by Avivah Litan 
“Why Cool: BioCatch provides invisible, continuous biometric 
authentication Gartner Cool Vendor of 2013 
a user on a PC or mobile application by using a novel 
technology that goes beyond the current approaches of monitoring 
keystroke dynamics, mouse movements, speed patterns and other 
physical actions“. 
4 Confidential , not for distribution
What business do we solve? 
Friction 
OTP 
123456 
123456 
We’re able to strongly authenticate 
without a friction cost 
5 Confidential , not for distribution 
SMS 
One time codes 
Smart Card 
Readers 
Tokens
What business do we solve? 
Fraud operations cost 
MITB (Man in the Browser) 
We’re able to accurately catch MITB, 
RAT live attacks in the act 
6 Confidential , not for distribution
The Science Behind BioCatch 
Neural Motor Control 
Or: how does our brain control movement? 
It involves: 
Information Processing 
Coordination 
Mechanics 
Physics 
Cognition 
7 Confidential , not for distribution 
-0.05 
-0.1 
-0.15 
-0.2 
-0.25 
-0.3 
-0.35 
-0.4 
-0.45 
-0.5 
-0.55 
-0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 
ÎČx 
ÎČy
Our Innovative Twist 
Invisible Challenges 
Or: how can we accelerate learning and detection? 
8 Confidential , not for distribution
Use case and demo 
9 Confidential , not for distribution 
Mobile 2FA 
(various designs) 
PC/Mobile Invisible
Triggering a Response | Pro-Active 
Example 
Say you’re using a mobile app, 
and drag an item to the right. 
10 Confidential , not for distribution 
Now say we introduce a subtle challenge
 
A 5° rotation to your move. 
This is what would happen if you don’t 
offset the rotation: you’ll end up a bit off 
target
 
But your brain won’t let this 
happen. You will spontaneously 
start correcting as soon as your 
mind picks up the off-target 
move, because your brain will 
work on completing the task. 
You won’t sense any change to 
the user experience, as it’s a 
low-volume effect (our research 
team tests it scientifically). 
And here’s the beauty of the BioCatch 
approach: 
Different people respond differently. 
Left: sharp, single correction (red) 
Right: complex, multiple corrections (blue) 
Colin | Fraud Director Shanee | QA Manager
The tall guy 
How do you hold the device? What happens when you tap it 
11 Confidential , not for distribution 
Meet Alon, our 6’7” tall iOS developer. 
When he thumps the device, it’s very 
visible (blue spike) 
Red/Green: x-y movement of device 
Blue: vertical movement (up/down)
Acceleration Patterns | Passive 
Example 
When moving mouse to the right, how fast do you ‘close loops’? 
 Very high in all 
moves 
 Very slow in 
short moves 
 Moderate in 
long moves 
12 Confidential , not for distribution
Selection wheel 
One small element
 And we can learn so much 
Passive traits: 
 Rotation speed 
 Cognitive choice: what 
do you spin first? 
 # of corrections at the 
end of spin 
 Final selection strategy 
(tap vs. spin) 
13 Confidential , not for distribution 
Pro-active, 
subtle challenges: 
 Slight Increase / 
Decrease Rotation speed 
 Slight change of speed 
during correction spins 
 Various small effects 
during final selection
Benefits over traditional behavioral 
analytics 
Property BioCatch Passive Behavioural 
a a 
Behavioural Parameters + + 
a 
Cognitive Parameters + - 
X 
Device Dependency Low High 
Time for building profile Short Long 
Excel at Free Form Usage 
a 
a 
14 Confidential , not for distribution 
Repeat Tasks (e.g. 
password, PIN typing) 
X 
Remote Access Detection + - 
X 
No Reply Attacks + -
CyberCatch deployment 
Top 10 Canadian Bank 
 Objective: reduce friction of High Risk 
 .2,000,000 Users of online banking since Sep 15th 
 30% access from tablets 
 Up and running in 5 days (2 days JS Integration+3 days QA) 
 3-month learning, 3-month operation 
Top 50 US bank 
 .500,000 Users of online banking 
 Finished testing 
15 Confidential , not for distribution
Our Project Heatmap 
Consumer Commercial 
Online 
Mobile 
Authentication 
Threat Detection 
Cognitive 
Behavioral 
Analysis 
16 Confidential , not for distribution
Technology & Deployment 
Q&A 
17 Confidential , not for distribution
Product Overview 
BioCatch for Web 
‱ Biometric Frictionless 
Authentication 
‱ RAT Detection 
‱ MitB Detection 
18 Confidential , not for distribution 
BioCatch for Mobile 
‱ Biometric Frictionless 
Authentication (Touch) 
‱ Multi-Factor Authentication 
Cognitive Behavioral Analytics Platform 
‱ BioCatch Management Application 
‱ BioCatch Integration Tools 
‱ BioCatch Rule/Alert Setting Tool (Roadmap) 
‱ BioCatch Visualizer Tool (Roadmap)
Online fraud detection 
Risk Alerts 
Session Data 
19 Confidential , not for distribution 
Management 
Application 
Fraud 
Team 
Bank’s Risk 
Engine 
BANK 
BioCatch 
Engine 
User Behavior 
(>350 Params) 
Frictionless 
Challenges 
JavaScript SDK 
Online Banking 
Payee 
Amount 
Mobile 
Banking 
Payee 
Amount
BioCatch Application Management 
20 Confidential , not for distribution
Online Banking Fraud Detection 
Detecting Man-in-the-Browser Attacks 
Human-in-the-Middle 
21 Confidential , not for distribution 
James 1st session 
James 2st session 
Automated Transactions (MitB) 
Time User Transaction 
10:22 FBorn None 
10:22 FGreen Add Payee 
10:26 JamesL Wire Transfer 
10:31 LinaP Wire Transfer
Product Overview 
Detecting Remote Access Sessions 
Fraudster's Computer Genuine User’s Computer 
22 Confidential , not for distribution 
RAT
Product Overview 
VS other Fraud Detection Approaches 
Cognitive Behavior 
“Genuine?” 
“Human?” 
“Remote?” 
Application 
Data 
“New Payee?” 
“Suspicious Navigation?” 
“High Amount?” 
23 Confidential , not for distribution 
Device 
Attributes 
“Known Device?” 
“Infected Device?” 
“Device IP Geo Location?” 
Fraud 
Detection 
Approaches
Product overview 
Less high risk Less fraud 
Risk Engine 
Application data? 
Device 
attributes? 
High Risk 
Transactions 
4%-8% 
Cognitive 
Behavior? 
>0.8% 
24 Confidential , not for distribution
BioCatch Product overview 
Integration tools 
Receive Alerts & Behavioral Data from BioCatch 
 Alerts - eMail, JavaScript 
 Alert + Data - Flat Files, API (web Service) 
Send BioCatch Fraud Feedback/ Whitelisting & Activity Data 
 Fraud Feedback/Whitelisting - BioCatch Management 
Application, Flat Files 
 Activity Data (for MitB detection) – API, Flat Files 
25 Confidential , not for distribution
Thank you! 
To learn more: www.biocatch.com 
26 Confidential , not for distribution

Weitere Àhnliche Inhalte

Was ist angesagt?

Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”
Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”
Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”Drift
 
IT Application Decommissioning - Application Retirement Services
IT Application Decommissioning - Application Retirement ServicesIT Application Decommissioning - Application Retirement Services
IT Application Decommissioning - Application Retirement ServicesAvenDATA
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best PracticesKnowBe4
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Office 365 Sales Presentation
Office 365 Sales PresentationOffice 365 Sales Presentation
Office 365 Sales PresentationThomas Perdana
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligenceHadi Fadlallah
 
How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)Lucas GarcĂ­a, PhD
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 
Reddit Advertisement Sales Pitch
Reddit Advertisement Sales PitchReddit Advertisement Sales Pitch
Reddit Advertisement Sales PitchJoseph Hsieh
 
Building Modern Intranets With SharePoint & Teams
Building Modern Intranets With SharePoint & TeamsBuilding Modern Intranets With SharePoint & Teams
Building Modern Intranets With SharePoint & TeamsJoy Apple
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Drew Madelung
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith YeungEdith Yeung
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Business Value Breakfast Presentation
Business Value Breakfast PresentationBusiness Value Breakfast Presentation
Business Value Breakfast PresentationSplunk
 

Was ist angesagt? (20)

Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”
Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”
Here’s The Deck Andy Raskin Called “The Greatest Sales Pitch I’ve Seen All Year”
 
IT Application Decommissioning - Application Retirement Services
IT Application Decommissioning - Application Retirement ServicesIT Application Decommissioning - Application Retirement Services
IT Application Decommissioning - Application Retirement Services
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Marv Wexler - Transform Your with AI.pdf
Marv Wexler - Transform Your with AI.pdfMarv Wexler - Transform Your with AI.pdf
Marv Wexler - Transform Your with AI.pdf
 
Barcoo Pitch Deck
Barcoo Pitch DeckBarcoo Pitch Deck
Barcoo Pitch Deck
 
Office 365 Sales Presentation
Office 365 Sales PresentationOffice 365 Sales Presentation
Office 365 Sales Presentation
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligence
 
How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)
 
Social Listening Tools
Social Listening ToolsSocial Listening Tools
Social Listening Tools
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Reddit Advertisement Sales Pitch
Reddit Advertisement Sales PitchReddit Advertisement Sales Pitch
Reddit Advertisement Sales Pitch
 
Building Modern Intranets With SharePoint & Teams
Building Modern Intranets With SharePoint & TeamsBuilding Modern Intranets With SharePoint & Teams
Building Modern Intranets With SharePoint & Teams
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Business Value Breakfast Presentation
Business Value Breakfast PresentationBusiness Value Breakfast Presentation
Business Value Breakfast Presentation
 

Andere mochten auch

Fraudsters
FraudstersFraudsters
FraudstersYanivt
 
Cyber attacks september 2014
Cyber attacks september 2014Cyber attacks september 2014
Cyber attacks september 2014Yanivt
 
Epoint agro ppt
Epoint agro pptEpoint agro ppt
Epoint agro pptYanivt
 
It's the wild west out there infographic
It's the wild west out there   infographicIt's the wild west out there   infographic
It's the wild west out there infographicYanivt
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationYanivt
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp pptYanivTaieb
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNYanivt
 
JustAd
JustAdJustAd
JustAdYanivt
 

Andere mochten auch (10)

Fraudsters
FraudstersFraudsters
Fraudsters
 
Cyber attacks september 2014
Cyber attacks september 2014Cyber attacks september 2014
Cyber attacks september 2014
 
Epoint agro ppt
Epoint agro pptEpoint agro ppt
Epoint agro ppt
 
It's the wild west out there infographic
It's the wild west out there   infographicIt's the wild west out there   infographic
It's the wild west out there infographic
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate Presentation
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTN
 
JustAd
JustAdJustAd
JustAd
 

Ähnlich wie Bio catch

How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfront2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfrontEric Ries
 
Lean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric RiesLean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric RiesWealthfront
 
2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true ventures2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true venturesEric Ries
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 Great Bay Software
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
DutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesDutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesBigML, Inc
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint SecurityAdrian Sanabria
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooAlex Stamos
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access ControlMd. Saddam Hossain Noyon
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsOz Forensics
 

Ähnlich wie Bio catch (20)

How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfront2010 10 25 lean startup for wealthfront
2010 10 25 lean startup for wealthfront
 
Lean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric RiesLean Startup for Geeks with Eric Ries
Lean Startup for Geeks with Eric Ries
 
2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true ventures2010 09 23 lean startup for true ventures
2010 09 23 lean startup for true ventures
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
DutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesDutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective Anomalies
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Better fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergyBetter fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergy
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
 

KĂŒrzlich hochgeladen

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 

KĂŒrzlich hochgeladen (20)

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀ 7710465962 Independent Call Girls In C...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 

Bio catch

  • 1. Frictionless Authentication and Advanced Threats Detection Benny Rosenbaum | CEO 1 Confidential , not for distribution
  • 2. Agenda  Introduction  What is BioCatch?  Product Details  Summary 2 Confidential , not for distribution
  • 3. Who are we? Israeli-based company (RSA, Trusteer, Israeli defense forces veterans) Gartner Cool Vendor 2013 Installed in US/Canada banks 3 Confidential , not for distribution Our technology: Cognitive Behavioral Analytics Authenticates the user in online/mobile banking Catches MITB, Remote Access Trojans (RATs) in the act Offering quick-ROI Deployment
  • 4. What’s special about BioCatch? Analysis by Avivah Litan “Why Cool: BioCatch provides invisible, continuous biometric authentication Gartner Cool Vendor of 2013 a user on a PC or mobile application by using a novel technology that goes beyond the current approaches of monitoring keystroke dynamics, mouse movements, speed patterns and other physical actions“. 4 Confidential , not for distribution
  • 5. What business do we solve? Friction OTP 123456 123456 We’re able to strongly authenticate without a friction cost 5 Confidential , not for distribution SMS One time codes Smart Card Readers Tokens
  • 6. What business do we solve? Fraud operations cost MITB (Man in the Browser) We’re able to accurately catch MITB, RAT live attacks in the act 6 Confidential , not for distribution
  • 7. The Science Behind BioCatch Neural Motor Control Or: how does our brain control movement? It involves: Information Processing Coordination Mechanics Physics Cognition 7 Confidential , not for distribution -0.05 -0.1 -0.15 -0.2 -0.25 -0.3 -0.35 -0.4 -0.45 -0.5 -0.55 -0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 ÎČx ÎČy
  • 8. Our Innovative Twist Invisible Challenges Or: how can we accelerate learning and detection? 8 Confidential , not for distribution
  • 9. Use case and demo 9 Confidential , not for distribution Mobile 2FA (various designs) PC/Mobile Invisible
  • 10. Triggering a Response | Pro-Active Example Say you’re using a mobile app, and drag an item to the right. 10 Confidential , not for distribution Now say we introduce a subtle challenge
 A 5° rotation to your move. This is what would happen if you don’t offset the rotation: you’ll end up a bit off target
 But your brain won’t let this happen. You will spontaneously start correcting as soon as your mind picks up the off-target move, because your brain will work on completing the task. You won’t sense any change to the user experience, as it’s a low-volume effect (our research team tests it scientifically). And here’s the beauty of the BioCatch approach: Different people respond differently. Left: sharp, single correction (red) Right: complex, multiple corrections (blue) Colin | Fraud Director Shanee | QA Manager
  • 11. The tall guy How do you hold the device? What happens when you tap it 11 Confidential , not for distribution Meet Alon, our 6’7” tall iOS developer. When he thumps the device, it’s very visible (blue spike) Red/Green: x-y movement of device Blue: vertical movement (up/down)
  • 12. Acceleration Patterns | Passive Example When moving mouse to the right, how fast do you ‘close loops’?  Very high in all moves  Very slow in short moves  Moderate in long moves 12 Confidential , not for distribution
  • 13. Selection wheel One small element
 And we can learn so much Passive traits:  Rotation speed  Cognitive choice: what do you spin first?  # of corrections at the end of spin  Final selection strategy (tap vs. spin) 13 Confidential , not for distribution Pro-active, subtle challenges:  Slight Increase / Decrease Rotation speed  Slight change of speed during correction spins  Various small effects during final selection
  • 14. Benefits over traditional behavioral analytics Property BioCatch Passive Behavioural a a Behavioural Parameters + + a Cognitive Parameters + - X Device Dependency Low High Time for building profile Short Long Excel at Free Form Usage a a 14 Confidential , not for distribution Repeat Tasks (e.g. password, PIN typing) X Remote Access Detection + - X No Reply Attacks + -
  • 15. CyberCatch deployment Top 10 Canadian Bank  Objective: reduce friction of High Risk  .2,000,000 Users of online banking since Sep 15th  30% access from tablets  Up and running in 5 days (2 days JS Integration+3 days QA)  3-month learning, 3-month operation Top 50 US bank  .500,000 Users of online banking  Finished testing 15 Confidential , not for distribution
  • 16. Our Project Heatmap Consumer Commercial Online Mobile Authentication Threat Detection Cognitive Behavioral Analysis 16 Confidential , not for distribution
  • 17. Technology & Deployment Q&A 17 Confidential , not for distribution
  • 18. Product Overview BioCatch for Web ‱ Biometric Frictionless Authentication ‱ RAT Detection ‱ MitB Detection 18 Confidential , not for distribution BioCatch for Mobile ‱ Biometric Frictionless Authentication (Touch) ‱ Multi-Factor Authentication Cognitive Behavioral Analytics Platform ‱ BioCatch Management Application ‱ BioCatch Integration Tools ‱ BioCatch Rule/Alert Setting Tool (Roadmap) ‱ BioCatch Visualizer Tool (Roadmap)
  • 19. Online fraud detection Risk Alerts Session Data 19 Confidential , not for distribution Management Application Fraud Team Bank’s Risk Engine BANK BioCatch Engine User Behavior (>350 Params) Frictionless Challenges JavaScript SDK Online Banking Payee Amount Mobile Banking Payee Amount
  • 20. BioCatch Application Management 20 Confidential , not for distribution
  • 21. Online Banking Fraud Detection Detecting Man-in-the-Browser Attacks Human-in-the-Middle 21 Confidential , not for distribution James 1st session James 2st session Automated Transactions (MitB) Time User Transaction 10:22 FBorn None 10:22 FGreen Add Payee 10:26 JamesL Wire Transfer 10:31 LinaP Wire Transfer
  • 22. Product Overview Detecting Remote Access Sessions Fraudster's Computer Genuine User’s Computer 22 Confidential , not for distribution RAT
  • 23. Product Overview VS other Fraud Detection Approaches Cognitive Behavior “Genuine?” “Human?” “Remote?” Application Data “New Payee?” “Suspicious Navigation?” “High Amount?” 23 Confidential , not for distribution Device Attributes “Known Device?” “Infected Device?” “Device IP Geo Location?” Fraud Detection Approaches
  • 24. Product overview Less high risk Less fraud Risk Engine Application data? Device attributes? High Risk Transactions 4%-8% Cognitive Behavior? >0.8% 24 Confidential , not for distribution
  • 25. BioCatch Product overview Integration tools Receive Alerts & Behavioral Data from BioCatch  Alerts - eMail, JavaScript  Alert + Data - Flat Files, API (web Service) Send BioCatch Fraud Feedback/ Whitelisting & Activity Data  Fraud Feedback/Whitelisting - BioCatch Management Application, Flat Files  Activity Data (for MitB detection) – API, Flat Files 25 Confidential , not for distribution
  • 26. Thank you! To learn more: www.biocatch.com 26 Confidential , not for distribution