SlideShare uma empresa Scribd logo
1 de 19
Behavioral Biometrics

Balancing Security with Usability


              Neil Costigan
Aiming to solve
 We aim to increase IT &
  mobile security in a cost-
  effective, transparent, and user
  friendly fashion.

 “The idea -- and I think this is a
  good one -- is that the
  computer can continuously
  authenticate people, and not
  just authenticate them once
  when they first start using their
  computers.”
  - Bruce Schneier
    Schneier on Security A blog covering security and security technology.
BehavioSec.                       Overview.
 Swedish IT-Start-up. Luleå (R&D) & Stockholm (Commercial)
 Backed by Conor Ventures (Finland) and consortium of regional
  agencies.
 Patented technology.
 Sales agents in US & Germany
 Product exists with high value paying customers TODAY.

Core position is
 Behaviour biometric for financial institution's web & mobile apps.
 Actively being pursued by handset manufacturers for differentiator.
 Success with US DARPA for desktop security add-on

Recent news
 Gartner „cool vendor 2012‟
 Finnovate „best in show‟ SF May 2012
So what are we looking at ?
  How the user interacts with device, browser or computer
How does it work
                                     Touch
                            Key
                                     Angle
                          Sequence
                                                 Touch
                                                Pressure

 Key
Flight

                           Key
                          Press      Touch
                                     Swipe




                                              Touch
                                             Quotient




”Press”   ”Flight”   ”Sequence”
Two distinct solutions
 Desktop
      Akin to an anti-virus solution.
      Sits transparently behind desktop
      Monitors ALL interaction. Both mouse and keyboard.
      Taking action if it detects abnormal behaviour.
      DARPA DoD desktop

 Web & Mobile. Help detect online fraud.
      No client install. Small code added to web forms or Apps
      Processed server side. (internal or cloud)
      Transparent customer experience.
      Adds to RISK scoring on a transaction.
      Allows for Forensics.
DARPA
   US Defense Advanced Research Projects Agency
   Fund „Moon shots‟
   Next generation DoD workstation security
   Active Authentication
   Transparent. Out of the hands of the end-user.

 Today US DoD. Tomorrow mainstream.
 A tool for all enterprise security desktops &
  professionals

 We have success with multi-year research contact.
BehavioWeb & Mobile
 Suitable for all web & mobile access where
  identity and user verification is valuable
 Banking & Payment industry tend to be early
  adopter's
 Social Media has urgent need
 Access portals (email, SharePoint's, cloud,
  etc)
 Government & Education

 Future is embedded into devices &
  infrastructure so handset manufactures are
  long term target
Web Architecture
                                                    Back Office
              Client




                                                                     BehavioStat


                             Web
                            Services



    Timing
    JSON

                                                                          Database




      Web              Business                              Management
     Server             Logic                                 Dashboard
                                       Management
Mobile biometric security for
enterprise
   “The need to provide a workable user experience that is consistent across
   multiple endpoints (including PCs, tablets and smartphones) has become
   one of the key considerations for any enterprise authentication
   implementation, including those using biometric identification methods.”


- Ant Allen. Gartner. Predicts 2012: A Maturing Competitive Landscape Brings New identity and access Management (IAM) Opportunities. Nov
2011.




  “Strategic Planning Assumptions
  By 2015, 30% of users accessing enterprise networks or high-value Web
  applications from smartphones or tablets will use biometric authentication.”
For social media&cloud services
Enhance social media platforms such as Facebook,
Linkedin etc. or cloud services (email, skydrives) with
transparent usable security.

 To prevent account hijacking (ie facerape).
 To strengthen the brand as a safe place to play.
 To increase usage of mobile clients as safe access
  devices regardless of their vulnerabilities.
 To enable the social media platform to be a trusted
  source of identity for higher value services such as
  banking and payments.
Technical problem ?
 Currently the de-facto authentication to all social media
  platforms or cloud services is via user/password.
 The username usually being email and a password
  being selected by the user.
 Typically no „hard password‟ rules.
 While this is in the lower spectrum of authentication
  techniques it has the benefit of being perceived as user
  friendly and is good for reflex typing.
Technical solution..
By transparently, and with little overhead, analyze the
customers‟ interaction with the social media site or mobile
client then using this behavior to help continuously, and in
real-time, verify their identity.
 Use of client side JavaScript or a mobile SDK enables
   the capture of user interaction.
 Server-side analysis compares to the users historic
   behavioral fingerprint.
 Augments or replaces captcha, device identity and geo-
   location.
 Safe biometrics.
Benefits
 Without making security over complex and less user
  friendly the social media platform can increase user trust
  while protecting the trusted brand.
 Utilize this trusted authentication to upsell identity
  services to high-value 3rd parties such as financial
  institutions, payments, gaming, who have traditionally
  shyed away voicing security and fraud concerns.
 Improved targetability for ad-networks.
Mobile biometric security for
enterprise
   “The need to provide a workable user experience that is consistent across
   multiple endpoints (including PCs, tablets and smartphones) has become
   one of the key considerations for any enterprise authentication
   implementation, including those using biometric identification methods.”


- Ant Allen. Gartner. Predicts 2012: A Maturing Competitive Landscape Brings New identity and access Management (IAM) Opportunities. Nov
2011.




  “Strategic Planning Assumptions
  By 2015, 30% of users accessing enterprise networks or high-value Web
  applications from smartphones or tablets will use biometric authentication.”
Match-in-net for mobile apps

 App Fields
              Backend Score      SDK for App developers to
                                  get Behaviometric data from
                                  iPhone or Android.
                                 Rich behaviour monitoring if
                                  platform allows (Android).
                                 Keystroke timings from
                                  native keyboard.
                                 Integrated to BehavioWeb
                                  for back-end risk based
                                  authentication.
Match-on-device for smart phones
                    Extended
                     authentication methods
                     for BYOD.
                    Secure mobile devices.
                    A Biometric lock without
                     extra hardware.
                    Looks at how the user
                     types or swipes a PIN
                     code.
                    Allows or denies
                     access to phone or
                     specific applications
Demos - Web
Available online :http://cloud.behaviosec.com/BehavioWebDemo

Sample Application:
 Scenario simulates a transaction that contains commonly
  used fields such as name, email and password.
 Added behavioural biometrics
 Can see scores in real-time and management console

http://cloud.behaviosec.com/BehavioWebDashboard/
Demos - Mobile
http://www.behaviosec.com/mobile-demonstration-video/

Apps in all app stores (Apple, Google, WindowsMobile)

Example : Available in Samsung App store:

Behavio AppGuard

   BYOD for sensitive apps
   Add biometrics to app access
   Typing or swiping authentication
   Five tries before locking the app
   30 second cool down

Mais conteúdo relacionado

Mais procurados

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?Kayra Obrain
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First RespondersImproving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First RespondersPriyanka Aash
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceCA API Management
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPriyanka Aash
 

Mais procurados (20)

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First RespondersImproving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First Responders
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
FingerprintTouch
FingerprintTouchFingerprintTouch
FingerprintTouch
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 

Semelhante a BehavioSec Web Summit START slideshare

Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end reviewLeigh Williamson
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
Enterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On BusinessEnterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On BusinessJonathan Stark
 
The smart devices era gx usa
The smart devices era gx usaThe smart devices era gx usa
The smart devices era gx usaGeneXus
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT ForumDeirdre Curran
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台Mike Chang
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023XDuce Corporation
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023XDuce Corporation
 
Mobilizing The Web - A Handheld Experience (IBM)
Mobilizing The Web - A Handheld Experience (IBM)Mobilizing The Web - A Handheld Experience (IBM)
Mobilizing The Web - A Handheld Experience (IBM)Mahmood Ashek
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022Cerebrum Infotech
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
BYOD Enterprise Mobility: Beauty & the Beast
BYOD Enterprise Mobility: Beauty & the BeastBYOD Enterprise Mobility: Beauty & the Beast
BYOD Enterprise Mobility: Beauty & the BeastCA API Management
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionDalia Reda
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 

Semelhante a BehavioSec Web Summit START slideshare (20)

Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
Enterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On BusinessEnterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On Business
 
The smart devices era gx usa
The smart devices era gx usaThe smart devices era gx usa
The smart devices era gx usa
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Mobilizing The Web - A Handheld Experience (IBM)
Mobilizing The Web - A Handheld Experience (IBM)Mobilizing The Web - A Handheld Experience (IBM)
Mobilizing The Web - A Handheld Experience (IBM)
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
BYOD Enterprise Mobility: Beauty & the Beast
BYOD Enterprise Mobility: Beauty & the BeastBYOD Enterprise Mobility: Beauty & the Beast
BYOD Enterprise Mobility: Beauty & the Beast
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 

Último

如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书Fir La
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书Fir La
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000Sapana Sha
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfsansanir
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfProbe Gold
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdftaxlinkcpa
 
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024nicola_mining
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityJohanAspro
 
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...Kumaran637735
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 

Último (20)

如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Serviceyoung  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdf
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdf
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdf
 
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanity
 
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
 
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 

BehavioSec Web Summit START slideshare

  • 1. Behavioral Biometrics Balancing Security with Usability Neil Costigan
  • 2. Aiming to solve  We aim to increase IT & mobile security in a cost- effective, transparent, and user friendly fashion.  “The idea -- and I think this is a good one -- is that the computer can continuously authenticate people, and not just authenticate them once when they first start using their computers.” - Bruce Schneier Schneier on Security A blog covering security and security technology.
  • 3. BehavioSec. Overview.  Swedish IT-Start-up. Luleå (R&D) & Stockholm (Commercial)  Backed by Conor Ventures (Finland) and consortium of regional agencies.  Patented technology.  Sales agents in US & Germany  Product exists with high value paying customers TODAY. Core position is  Behaviour biometric for financial institution's web & mobile apps.  Actively being pursued by handset manufacturers for differentiator.  Success with US DARPA for desktop security add-on Recent news  Gartner „cool vendor 2012‟  Finnovate „best in show‟ SF May 2012
  • 4. So what are we looking at ? How the user interacts with device, browser or computer
  • 5. How does it work Touch Key Angle Sequence Touch Pressure Key Flight Key Press Touch Swipe Touch Quotient ”Press” ”Flight” ”Sequence”
  • 6. Two distinct solutions  Desktop  Akin to an anti-virus solution.  Sits transparently behind desktop  Monitors ALL interaction. Both mouse and keyboard.  Taking action if it detects abnormal behaviour.  DARPA DoD desktop  Web & Mobile. Help detect online fraud.  No client install. Small code added to web forms or Apps  Processed server side. (internal or cloud)  Transparent customer experience.  Adds to RISK scoring on a transaction.  Allows for Forensics.
  • 7. DARPA  US Defense Advanced Research Projects Agency  Fund „Moon shots‟  Next generation DoD workstation security  Active Authentication  Transparent. Out of the hands of the end-user.  Today US DoD. Tomorrow mainstream.  A tool for all enterprise security desktops & professionals  We have success with multi-year research contact.
  • 8. BehavioWeb & Mobile  Suitable for all web & mobile access where identity and user verification is valuable  Banking & Payment industry tend to be early adopter's  Social Media has urgent need  Access portals (email, SharePoint's, cloud, etc)  Government & Education  Future is embedded into devices & infrastructure so handset manufactures are long term target
  • 9. Web Architecture Back Office Client BehavioStat Web Services Timing JSON Database Web Business Management Server Logic Dashboard Management
  • 10. Mobile biometric security for enterprise “The need to provide a workable user experience that is consistent across multiple endpoints (including PCs, tablets and smartphones) has become one of the key considerations for any enterprise authentication implementation, including those using biometric identification methods.” - Ant Allen. Gartner. Predicts 2012: A Maturing Competitive Landscape Brings New identity and access Management (IAM) Opportunities. Nov 2011. “Strategic Planning Assumptions By 2015, 30% of users accessing enterprise networks or high-value Web applications from smartphones or tablets will use biometric authentication.”
  • 11. For social media&cloud services Enhance social media platforms such as Facebook, Linkedin etc. or cloud services (email, skydrives) with transparent usable security.  To prevent account hijacking (ie facerape).  To strengthen the brand as a safe place to play.  To increase usage of mobile clients as safe access devices regardless of their vulnerabilities.  To enable the social media platform to be a trusted source of identity for higher value services such as banking and payments.
  • 12. Technical problem ?  Currently the de-facto authentication to all social media platforms or cloud services is via user/password.  The username usually being email and a password being selected by the user.  Typically no „hard password‟ rules.  While this is in the lower spectrum of authentication techniques it has the benefit of being perceived as user friendly and is good for reflex typing.
  • 13. Technical solution.. By transparently, and with little overhead, analyze the customers‟ interaction with the social media site or mobile client then using this behavior to help continuously, and in real-time, verify their identity.  Use of client side JavaScript or a mobile SDK enables the capture of user interaction.  Server-side analysis compares to the users historic behavioral fingerprint.  Augments or replaces captcha, device identity and geo- location.  Safe biometrics.
  • 14. Benefits  Without making security over complex and less user friendly the social media platform can increase user trust while protecting the trusted brand.  Utilize this trusted authentication to upsell identity services to high-value 3rd parties such as financial institutions, payments, gaming, who have traditionally shyed away voicing security and fraud concerns.  Improved targetability for ad-networks.
  • 15. Mobile biometric security for enterprise “The need to provide a workable user experience that is consistent across multiple endpoints (including PCs, tablets and smartphones) has become one of the key considerations for any enterprise authentication implementation, including those using biometric identification methods.” - Ant Allen. Gartner. Predicts 2012: A Maturing Competitive Landscape Brings New identity and access Management (IAM) Opportunities. Nov 2011. “Strategic Planning Assumptions By 2015, 30% of users accessing enterprise networks or high-value Web applications from smartphones or tablets will use biometric authentication.”
  • 16. Match-in-net for mobile apps App Fields Backend Score  SDK for App developers to get Behaviometric data from iPhone or Android.  Rich behaviour monitoring if platform allows (Android).  Keystroke timings from native keyboard.  Integrated to BehavioWeb for back-end risk based authentication.
  • 17. Match-on-device for smart phones  Extended authentication methods for BYOD.  Secure mobile devices.  A Biometric lock without extra hardware.  Looks at how the user types or swipes a PIN code.  Allows or denies access to phone or specific applications
  • 18. Demos - Web Available online :http://cloud.behaviosec.com/BehavioWebDemo Sample Application:  Scenario simulates a transaction that contains commonly used fields such as name, email and password.  Added behavioural biometrics  Can see scores in real-time and management console http://cloud.behaviosec.com/BehavioWebDashboard/
  • 19. Demos - Mobile http://www.behaviosec.com/mobile-demonstration-video/ Apps in all app stores (Apple, Google, WindowsMobile) Example : Available in Samsung App store: Behavio AppGuard  BYOD for sensitive apps  Add biometrics to app access  Typing or swiping authentication  Five tries before locking the app  30 second cool down

Notas do Editor

  1. Mission blah blah
  2. Forlogica notes:really stared in 2011 when we first raised cash.1 EU/US patent3 US PTOOur target market is not vertical specific.We've got interest in finance, enterprise, Defense.consumer web & healthcare make sense too.Crosses all areas. But We've got campaigns to focus on the needs and compliance requirements of finance & defensebut the product offering crosses them all.
  3. Both these have potential for logicaA new tool for the security away enterpeiseWeb&mobile are archectited for Cloud services
  4. We have advanced prototype of such a desktp product.Next steps would be large scale trials give data to further fine tune algotithms tighter integration to windows, integration to network & security management and systems roaming profiles via cloud and/or smart card.
  5. The back end can be