1
Mobile & Browser Security
InAuth, Inc.
2
InAuth Corporate Overview
InAuth has deep roots in the mobile space, as well as strong Financial Services, ...
Trends
o Security breaches via malware
and bots are more frequent,
bigger and national news -
Target, Neimans, etc.
o Cons...
Value Proposition
4
 Increased Revenue - approve more transactions with high degree of
confidence
 Enhanced Decisioning ...
Benefits
5
 True Mobile Identity Data (Persistent Identifier)
 Unprecedented visibility to device data
 Trusted (cross-...
6
Ed Hodges
ed@inauth.com
Twitter: edjhodges
Upcoming SlideShare
Loading in...5
×

InAuth Mobile and Browser benefits for Authentication and Fraud / Malware Detection

398

Published on

InAuth specialises in mobile and browser authentication and fraud / malware detection for Financial Services and Online Retailers. Amongst it's products are Dynamic and Persistent ID, deep location lookup, malware and crimeware detection, root detection and fuzzy device fingerprinting.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
398
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

InAuth Mobile and Browser benefits for Authentication and Fraud / Malware Detection

  1. 1. 1 Mobile & Browser Security
  2. 2. InAuth, Inc. 2 InAuth Corporate Overview InAuth has deep roots in the mobile space, as well as strong Financial Services, Risk, Fraud, and Device Identification and Intelligence coverage. We are a privately-held software company, full of engineers and developers backed by very successful former bankers and entrepreneurs. Our sole focus is security for financial services and alternative payment providers. InAuth meets and exceeds authentication and layered security guidelines set forth by regulators/agencies including the Federal Financial Institutions Examination Council (FFIEC). InAuth delivers a user-friendly secure transaction environment to the financial services and mobile transaction markets with our suite of PC/mobile browser fingerprinting/fraud detection and mobile security modules (SDK’s) that are integrated with the downloadable mobile applications and work with our Risk Engine and Case Management System within our Security Platform. The InAuth system may snap into the existing systems or risk management tools (such as RSA, Actimize or others) both seamlessly and transparently.
  3. 3. Trends o Security breaches via malware and bots are more frequent, bigger and national news - Target, Neimans, etc. o Consumers have and are continuing to shift toward mobile devices and mobile apps o Mobile can be the weakest link, presenting substantial exposure to fraud. 3 The Problem • Mobile devices subvert controls that are relied on in the browser- based online world, namely IP address…which does not yield results in mobile apps. • Mobile malware via phishing and SMSishing is proliferating and difficult to spot due to screen size & limited info. Open platforms such as Android are particularly vulnerable. • New capabilities due to customer demand, remote deposit capture & mobile payments bring new attack vectors. As more risky transactions are enabled, better mobile centric security is critical.
  4. 4. Value Proposition 4  Increased Revenue - approve more transactions with high degree of confidence  Enhanced Decisioning - increased visibility to the device provides for richer data for better risk decisions  Increased Security Measures – providing more granular device details, (browser or mobile) not available with other solutions, will help to determine the identity and assist in determining the riskiness of the transaction  Brand Protection – no disruption to the customer experience - reducing the challenge rate and creating a stronger customer relationship  MinimizeOperating costs – reduce rejects and outsorts enables for investigation on only the riskiest transactions
  5. 5. Benefits 5  True Mobile Identity Data (Persistent Identifier)  Unprecedented visibility to device data  Trusted (cross-checked) location data  Accelerate time to detection with more precise data points  PIN & Reputation Protection (Advanced Root & Crimeware Detect)  Ability to write more & better rules (more data delivered)  Lower collision rates (more accurate browser print)
  6. 6. 6 Ed Hodges ed@inauth.com Twitter: edjhodges

×