SlideShare a Scribd company logo
1 of 17
Behavior Biometrics
The silent revolution in
digital fingerprinting
Rui Melo Biscaia
Watchful Software
Some “house rules” on this Webinar
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2
1
You are muted centrally.
You don’t need to mute/unmute yourself
2
This webinar is being recorded.
You’ll have access to it on-demand on www.watchfulsoftware.com
3
The Q&A session will be at the end.
You are welcomed to enter questions anytime, using the Questions feature
in the GoToWebinar control panel
Speaker
Rui Melo Biscaia
Director of Product Management & Strategic Accounts
Watchful Software
How secure are our Digital Identities?
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
How secure are our Digital Identities?
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
Behavior Biometrics in a nutshell
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
1 Monitors for identity theft attempts by means of analyzing typing patterns of users
2
Continually verifies users’ identities as they type during each windows session in an on-going
basis
3
Requiring no hardware, is a software only solution, that understands who the user is in less
than a tweet
4 Complements any Intrusion Detection System, or 2FA, by adding a behavior biometric layer
5 Works with any language, works with any app, works with any content
6 Runs in the background, transparent to the user, and never asking for dedicated text input
7
Delivers mitigation actions – Screenshot, Photo, Lock screen, E-mail, Text authentication
screen, etc…
Behavior Biometrics - Use Cases
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6
 What if someone tries to
impersonate me send
emails or post on my
behalf?
 How can the system
tackle it and prevent that
from happening?
 What if a student allows
another person to take the
exam once he/she has
entered the login details?
 How can the system
identify that the student
taking the exam is actually
him/her and not someone
else?
 What if someone knows or
steals your login
credentials?
 How can the system
understand and react to
the fact that that the
person using the
computer is not you?
Is someone else logged in
my computer?
Is someone trying to
impersonate me in social
media?
Is someone cheating on
this online exam?
Passive Enrollment and Dynamic Profiling
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
TypeWATCH is Behavior Biometrics
TypeWATCH: Product suite offer
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
4 Individuals WEB
 To the enterprise
 Managed centrally
 Enforcement of policies
 Security Roles & Levels
 Monitor alarms
 User based mitigation
actions
Enterprise
TypeWATCH Enterprise
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
 To the enterprise
 Managed centrally
 Enforcement of policies
 Security Roles & Levels
 Monitor alarms
 User based mitigation
actions
Enterprise
TypeWATCH Enterprise
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 11
 To the enterprise
 Managed centrally
 Enforcement of policies
 Security Roles & Levels
 Monitor alarms
 User based mitigation
actions
Enterprise
TypeWATCH Enterprise
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 12
 To the enterprise
 Managed centrally
 Enforcement of policies
 Security Roles & Levels
 Monitor alarms
 User based mitigation
actions
Enterprise
TypeWATCH: Product suite offer
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 13
 To end-users/mass
market
 Download and start using
it. No server.
 Freemium pricing model
 Also used for POCs and
demoing the product
4 Individuals WEBEnterprise
TypeWATCH for Individuals
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14
 To end-users/mass
market
 Download and start using
it. No server.
 Freemium pricing model
 Also used for POCs and
demoing the product
4 Individuals
TypeWATCH: Product suite offer
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15
 To the enterprise
providing web-based
services
 Does not require a client
agent to be installed
 Applies to a website or
web platform
4 Individuals WEBEnterprise
6 (tech) reasons why TypeWATCH
11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16
Precise Delivers 98% plus accuracy and makes it virtually impossible to mimic another person's typing pattern
Persistent Constantly assesses typing samples against a legitimate user’s stored dynamic pattern
Dynamic
Offsets tiredness, switching and or sharing of computers / keyboards, mood, influence of alcohol and
medications, etc, and sets individual thresholds to every user to increase performance
Simple There is no special hardware needed as with other biometrics – a standard keyboard is sufficient
Safe
Data verification is provided between the input (keyboard) to the matching algorithm (even with remote
desktop typing)
Auditable An intruder can be identified by means of matching the typing sample against the profile database.
Behavior Biometrics
The silent revolution in
digital fingerprinting
Rui Melo Biscaia
Watchful Software

More Related Content

Similar to Behavior biometrics - The silent revolution in digital fingerprinting

Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
FraudBusters
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
Ashlie Steele
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
Anatoliy Tkachev
 

Similar to Behavior biometrics - The silent revolution in digital fingerprinting (20)

Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditCompliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
5 Keys to Your Best Automated Testing Strategy
5 Keys to Your Best Automated Testing Strategy5 Keys to Your Best Automated Testing Strategy
5 Keys to Your Best Automated Testing Strategy
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Matteo meucci Software Security - Napoli 10112016
Matteo meucci   Software Security - Napoli 10112016Matteo meucci   Software Security - Napoli 10112016
Matteo meucci Software Security - Napoli 10112016
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Wearables Landscape 2015 - Sample Report
Wearables Landscape 2015 - Sample ReportWearables Landscape 2015 - Sample Report
Wearables Landscape 2015 - Sample Report
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
 
Progressive Web Apps - Goto Chicago 2017
Progressive Web Apps - Goto Chicago 2017Progressive Web Apps - Goto Chicago 2017
Progressive Web Apps - Goto Chicago 2017
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
Seven Steps to Pragmatic Mobile Testing
Seven Steps to Pragmatic Mobile TestingSeven Steps to Pragmatic Mobile Testing
Seven Steps to Pragmatic Mobile Testing
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
56_Hackerschool.in_guestblog.docx
56_Hackerschool.in_guestblog.docx56_Hackerschool.in_guestblog.docx
56_Hackerschool.in_guestblog.docx
 
Five Physical Security Measures Every Company Should Adopt
Five Physical Security Measures Every Company Should AdoptFive Physical Security Measures Every Company Should Adopt
Five Physical Security Measures Every Company Should Adopt
 

More from Watchful Software

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
Watchful Software
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
Watchful Software
 

More from Watchful Software (12)

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirements
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
Bringing policy based classification to Sharepoint
Bringing policy based classification to SharepointBringing policy based classification to Sharepoint
Bringing policy based classification to Sharepoint
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Behavior biometrics - The silent revolution in digital fingerprinting

  • 1. Behavior Biometrics The silent revolution in digital fingerprinting Rui Melo Biscaia Watchful Software
  • 2. Some “house rules” on this Webinar 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2 1 You are muted centrally. You don’t need to mute/unmute yourself 2 This webinar is being recorded. You’ll have access to it on-demand on www.watchfulsoftware.com 3 The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel Speaker Rui Melo Biscaia Director of Product Management & Strategic Accounts Watchful Software
  • 3. How secure are our Digital Identities? 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
  • 4. How secure are our Digital Identities? 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
  • 5. Behavior Biometrics in a nutshell 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5 1 Monitors for identity theft attempts by means of analyzing typing patterns of users 2 Continually verifies users’ identities as they type during each windows session in an on-going basis 3 Requiring no hardware, is a software only solution, that understands who the user is in less than a tweet 4 Complements any Intrusion Detection System, or 2FA, by adding a behavior biometric layer 5 Works with any language, works with any app, works with any content 6 Runs in the background, transparent to the user, and never asking for dedicated text input 7 Delivers mitigation actions – Screenshot, Photo, Lock screen, E-mail, Text authentication screen, etc…
  • 6. Behavior Biometrics - Use Cases 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6  What if someone tries to impersonate me send emails or post on my behalf?  How can the system tackle it and prevent that from happening?  What if a student allows another person to take the exam once he/she has entered the login details?  How can the system identify that the student taking the exam is actually him/her and not someone else?  What if someone knows or steals your login credentials?  How can the system understand and react to the fact that that the person using the computer is not you? Is someone else logged in my computer? Is someone trying to impersonate me in social media? Is someone cheating on this online exam?
  • 7. Passive Enrollment and Dynamic Profiling 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
  • 8. 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8 TypeWATCH is Behavior Biometrics
  • 9. TypeWATCH: Product suite offer 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9 4 Individuals WEB  To the enterprise  Managed centrally  Enforcement of policies  Security Roles & Levels  Monitor alarms  User based mitigation actions Enterprise
  • 10. TypeWATCH Enterprise 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10  To the enterprise  Managed centrally  Enforcement of policies  Security Roles & Levels  Monitor alarms  User based mitigation actions Enterprise
  • 11. TypeWATCH Enterprise 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 11  To the enterprise  Managed centrally  Enforcement of policies  Security Roles & Levels  Monitor alarms  User based mitigation actions Enterprise
  • 12. TypeWATCH Enterprise 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 12  To the enterprise  Managed centrally  Enforcement of policies  Security Roles & Levels  Monitor alarms  User based mitigation actions Enterprise
  • 13. TypeWATCH: Product suite offer 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 13  To end-users/mass market  Download and start using it. No server.  Freemium pricing model  Also used for POCs and demoing the product 4 Individuals WEBEnterprise
  • 14. TypeWATCH for Individuals 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14  To end-users/mass market  Download and start using it. No server.  Freemium pricing model  Also used for POCs and demoing the product 4 Individuals
  • 15. TypeWATCH: Product suite offer 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15  To the enterprise providing web-based services  Does not require a client agent to be installed  Applies to a website or web platform 4 Individuals WEBEnterprise
  • 16. 6 (tech) reasons why TypeWATCH 11/16/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16 Precise Delivers 98% plus accuracy and makes it virtually impossible to mimic another person's typing pattern Persistent Constantly assesses typing samples against a legitimate user’s stored dynamic pattern Dynamic Offsets tiredness, switching and or sharing of computers / keyboards, mood, influence of alcohol and medications, etc, and sets individual thresholds to every user to increase performance Simple There is no special hardware needed as with other biometrics – a standard keyboard is sufficient Safe Data verification is provided between the input (keyboard) to the matching algorithm (even with remote desktop typing) Auditable An intruder can be identified by means of matching the typing sample against the profile database.
  • 17. Behavior Biometrics The silent revolution in digital fingerprinting Rui Melo Biscaia Watchful Software

Editor's Notes

  1. As long as the session remains active, typical systems incorporate no mechanisms to verify that the user originally authenticated is the user still in control of the keyboard. Thus unauthorized individuals may improperly obtain extended access to information system resources if a password is compromised or if a user does not exercise adequate vigilance after initially authenticating at the console.
  2. As long as the session remains active, typical systems incorporate no mechanisms to verify that the user originally authenticated is the user still in control of the keyboard. Thus unauthorized individuals may improperly obtain extended access to information system resources if a password is compromised or if a user does not exercise adequate vigilance after initially authenticating at the console.
  3. Example Use case #1. Legitimate user is attempting to log in to his/her enterprise resources. The user provides valid credentials, and other risk checks have been verified (device recognition was checked, threat service is known, request is coming from a known location, no improbable travel event has occurred, and identity looks legit compared to our identity store). But if the user’s behavioral biometric profile doesn’t match the profile of record for the legitimate user Example Use case #2. Legitimate user fails to log off before leaving for lunch. An attacker sits down at that workstation and tries to view sensitive data that the legitimate user has access to. But because the attackers’ typing sequences do not match the legitimate user’s behavioral biometric profile, Keystroke Dynamics may invoke multi-factor authentication, thwarting the attacker and keeping the sensitive data safe
  4. Flexible (passive) Enrolment and Roll-out Provides immediate or gradual enrolment Can be gradually or instantaneously deployed to the any number of users of users Profiling, Enrollment and Persistent Identity Validation The user is not required to type dedicated text nor to use dedicated application The system is ready to start, on it has gathered enough typing rhythms to built a first reliable biometric profile The profile is built dynamically and is constantly being updated Profile theft and reproduction are not a threat as Keystroke identifiers and information are: Stored as a hash value Masked before hashing Unique to each user Sent to the server in large chunks of data With no regard to the sequence they were originally typed Accuracy Marginal false acceptance rate Increases strength with every successful login Continuous security post-login (inside the perimeter) Does not register what is being typed. Only unique typing rhythms: Dwell times - time elapsed with a key pressed down; Flight times - time elapsed on the travel between consecutive keys
  5. TypeWATCH, an e-biometric solution that continuously authenticate and detect possible intrusions.
  6. Directed to enterprise customers Deployed centrally and allows for fine-grained management and enforcement of policies Supports Centralized Management and Monitoring Management of Users Assignment of Security Roles and Licenses Definition of security levels Control end-users allowed actions Reset user’s biometric profile centrally Monitoring Monitor alarms for each user Search for user actions/alarms and get details over the alarm
  7. Administration Console monitoring tab example with: Alarms of each user; Search option; Alarm details including photo and screenshot.
  8. Special actions can be selected: E-mail received by the user right after the intrusion detection contains the alarm details including photo and screenshot; After each alarm the workstation is locked and password authentication is requested. After authentication by password, the user workspace is locked again but now by the text authentication screen asking to the user to write free text in order to be authenticated by the way he types.
  9. Directed to end-users/mass market Any windows user can download and install TypeWATCH and start using it in a matter of minutes Will be delivered initially as freemium/shareware and a paying version will come in the future Works as a stand-alone app on any windows computer Allows users to monitor and adapt security settings locally Users are able to verify what alarms where detected and when User are able to adapt their profile strictness level and hence the algorithm sensitivity May also be used for Proof of Concept/Demoing the product/algorithm