SlideShare a Scribd company logo
1 of 19
Download to read offline
Who’s Playing Who?!

The game of stopping risk
by knowing your user.
© 2015 NuData Security, Inc.
Agenda
• Online Fraud in the Industry 
• What’s on the Line? 
• Challenges in Combating Fraud in Gaming 
• The Risks & The Missing Link
• The Secret Weapon
• The Results 

© 2015 NuData Security, Inc.
Online Fraud in the Industry
•  Under more pressure to deliver
•  More and more competition à Increased need to deliver a excellent product and play
•  Increase in sophistication of fraudsters
•  Gone are the days when we see bad actors signing on using the same 50 email addresses 
•  Multiple communication channels between players
•  Collusion – people are using multiple accounts in an attempt to defraud the system
•  Increasing need for real-time risk assessment
•  Understand what is going on in real-time to be able to protect yourself and
understand who your customers are
•  Maintaining customer trust
•  Reducing customer attrition and maintaining customer trust is paramount

 With high levels of expected growth, the gaming industry is !
increasingly a target for highly sophisticated, organized fraud.
© 2015 NuData Security, Inc.
A World of Anonymity
Players are sitting behind
machines and you don’t
really know who they are

•  It is important to get to
that next level where
you’re not just dealing with
a machine
•  Truly understand who you
are doing business with
© 2015 NuData Security, Inc.
What are the Risks?
•  Monetary
•  Reputation 
•  Card Schemes & Chargebacks
•  Member Attrition
•  Compliance
•  Operational
© 2015 NuData Security, Inc.
What’s on the Line? 
The online gaming
industry is
estimated to be
valued at 
£27 billion or 
$41.4 billion in
2015
Source:	
  Aite	
  
© 2015 NuData Security, Inc.
The Missing Layer 
KBAS
Device
Passwords
(Knowledge)
(Possessions)
Basic. 
A password is
either right or
wrong, what more
information do you
have?
Binary.
What happens when a
player changes their
device?
© 2015 NuData Security, Inc.
The Secret Weapon
User  Behavior  Biometrics
© 2015 NuData Security, Inc.
The Secret Weapon
• Predictive Behavioral Biometrics
•  A layered approach to understanding who
a player is and how they are interacting in
real-time.
• Know the real user and
understand their behavior 
•  How they interact with different devices?
•  How the player moves across
environment?
• Know who to trust
•  Is this truly the correct human interacting
with your environment?
© 2015 NuData Security, Inc.
Where it Fits
KBAS
Behavior
Device
Passwords
(Knowledge)
(Ac2ons)
(Possessions)
Basic. 
A password is
either right or
wrong, what more
information do you
have?
Binary.
What happens when a
player changes their
device?
Confidence.
We know that this is
the right user based
on the way they are
interacting.
© 2015 NuData Security, Inc.
What it Does
Is the player behaving like a human?
Is the player behaving like others?
Is the player acting safely? 
Passively validates users using predictive behavioral
biometrics
•  Understand when there are deviations and emerging threats that don’t make
sense within the environment
© 2015 NuData Security, Inc.
How?
DeviceID
Location
Typing
Angle of Device
Scrolling
Continuous Behavior Analysis
User Actions
Does this data,
when all combined,
make sense for who
this user is and who
we’re expecting
them to be?	
  
© 2015 NuData Security, Inc.
The  Needle  in  the  Haystack
© 2015 NuData Security, Inc. 
Why are we looking for the
needle when all of that good
hay is sitting there? 

•  The overwhelming majority of
interactions within your online
environment are from good, safe
customers
•  Identify those good customers and
then that bad needle will make itself
evident
Do  you  know  your  users?
© 2015 NuData Security, Inc. 
•  This is one of NuData’s customers logins over a 30 day period. What is safe in this
environment and what is potentially risk?
•  Layer risk on and start to clearly be able to see outliers who are doing things that
don’t make sense – creating risk
	
  
Now  you  Know
• The	
  risk	
  presented	
  by	
  exis6ng	
  and	
  new	
  customers	
  
•  Understand	
  when	
  customers	
  are	
  crea6ng	
  risk	
  
• When	
  it	
  is	
  the	
  correct	
  user	
  behind	
  the	
  account	
  	
  
• When	
  the	
  user	
  has	
  changed	
  	
  
•  Even	
  when	
  you	
  see	
  the	
  correct	
  devicea	
  and	
  the	
  correct	
  ID,	
  you	
  
can	
  know	
  that	
  it’s	
  not	
  the	
  correct	
  person	
  who	
  has	
  logged	
  into	
  
this	
  account	
  
• Mul6	
  account	
  risk	
  	
  
• Who	
  you	
  can	
  trust	
  
	
  
© 2015 NuData Security, Inc.
When  You  Know  Who  to  Trust
• Validate	
  trusted	
  users	
  early	
  
• Reduce	
  fraud	
  
• Accept	
  more	
  players	
  quickly,	
  
reduce	
  risk	
  	
  	
  
• Provide	
  quality	
  experience	
  for	
  
trusted	
  players	
  
•  Add	
  the	
  capability	
  of	
  being	
  
predic6ve	
  about	
  who	
  your	
  good	
  
customer	
  is	
  
Offer	
  more.	
  Grow	
  Footprint.	
  Trust.	
  	
  
	
  
© 2015 NuData Security, Inc.
Keep  Your  Good  Users  

© 2015 NuData Security, Inc. 
•  What genuine users want: Trust & Safety without
Friction
•  You want a solution that can passively identify who
your users are
The  Big  Wins
Reduce	
  false	
  
posi.ves	
  
Increase	
  trust	
  
and	
  safety	
  for	
  
all	
  users	
  
across	
  all	
  
devices.	
  
Grow	
  Sales	
  
	
  Offer	
  higher	
  
value	
  promos	
  
to	
  trusted	
  
users	
  
Reduce	
  
fric.on	
  
Improve	
  
Conversion	
  
© 2015 NuData Security, Inc.
Thank  You!

  
© 2015 NuData Security, Inc. 
download.nudatasecurity.com/user-behavior-analytics
nudatasecurity.com
@nudatasecurity

More Related Content

What's hot

Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
SecuRing
 
Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021
101 Blockchains
 

What's hot (12)

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract Auditing
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchain
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Ppt
PptPpt
Ppt
 
Newsletter dated 24th November, 2015
Newsletter dated 24th November, 2015Newsletter dated 24th November, 2015
Newsletter dated 24th November, 2015
 
identity based encryption transformation for flexible sharing of encrypted da...
identity based encryption transformation for flexible sharing of encrypted da...identity based encryption transformation for flexible sharing of encrypted da...
identity based encryption transformation for flexible sharing of encrypted da...
 
Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity
 

Viewers also liked

1.3.1 introduction to first aid
1.3.1 introduction to first aid1.3.1 introduction to first aid
1.3.1 introduction to first aid
prssncdcc
 
First aid powerpoint
First aid powerpointFirst aid powerpoint
First aid powerpoint
srastall
 
First aid in hotel industry
First aid in hotel industryFirst aid in hotel industry
First aid in hotel industry
Dr. Sunil Kumar
 
Project on first aid
Project on first aidProject on first aid
Project on first aid
sanaya irani
 
Defibrillator (ppt)
Defibrillator (ppt)Defibrillator (ppt)
Defibrillator (ppt)
Nitesh Kumar
 
Hands ON CPR Training by West Texas CPR & Safety Training
Hands ON CPR Training by West Texas CPR & Safety TrainingHands ON CPR Training by West Texas CPR & Safety Training
Hands ON CPR Training by West Texas CPR & Safety Training
Atlantic Training, LLC.
 

Viewers also liked (20)

ONTAP - Wilderness First Aid 3
ONTAP - Wilderness First Aid 3ONTAP - Wilderness First Aid 3
ONTAP - Wilderness First Aid 3
 
First aid
First aidFirst aid
First aid
 
CPR Quiz - free online first aid training
CPR Quiz - free online first aid trainingCPR Quiz - free online first aid training
CPR Quiz - free online first aid training
 
First Aid
First AidFirst Aid
First Aid
 
Wounds
WoundsWounds
Wounds
 
1.3.1 introduction to first aid
1.3.1 introduction to first aid1.3.1 introduction to first aid
1.3.1 introduction to first aid
 
First aid kit presentation 2013(1)
First aid kit presentation 2013(1)First aid kit presentation 2013(1)
First aid kit presentation 2013(1)
 
Wound care and treatment for nursing
Wound care and treatment for nursingWound care and treatment for nursing
Wound care and treatment for nursing
 
First aid powerpoint
First aid powerpointFirst aid powerpoint
First aid powerpoint
 
First Aid
First AidFirst Aid
First Aid
 
Introduction to First Aid
Introduction to First AidIntroduction to First Aid
Introduction to First Aid
 
Bandaging
BandagingBandaging
Bandaging
 
How to use an Automated External Defibrillator (AED)
How to use an Automated External Defibrillator (AED)How to use an Automated External Defibrillator (AED)
How to use an Automated External Defibrillator (AED)
 
Basic First Aid (Bleeding)
Basic First Aid (Bleeding) Basic First Aid (Bleeding)
Basic First Aid (Bleeding)
 
First aid in hotel industry
First aid in hotel industryFirst aid in hotel industry
First aid in hotel industry
 
ppt on Bandaging
ppt on Bandagingppt on Bandaging
ppt on Bandaging
 
Wounds
WoundsWounds
Wounds
 
Project on first aid
Project on first aidProject on first aid
Project on first aid
 
Defibrillator (ppt)
Defibrillator (ppt)Defibrillator (ppt)
Defibrillator (ppt)
 
Hands ON CPR Training by West Texas CPR & Safety Training
Hands ON CPR Training by West Texas CPR & Safety TrainingHands ON CPR Training by West Texas CPR & Safety Training
Hands ON CPR Training by West Texas CPR & Safety Training
 

Similar to Who's Playing Who?

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
Evan Francen
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
Momina Mateen
 

Similar to Who's Playing Who? (20)

The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital Identity
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online Store
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Who's Playing Who?

  • 1. Who’s Playing Who?! The game of stopping risk by knowing your user. © 2015 NuData Security, Inc.
  • 2. Agenda • Online Fraud in the Industry • What’s on the Line? • Challenges in Combating Fraud in Gaming • The Risks & The Missing Link • The Secret Weapon • The Results © 2015 NuData Security, Inc.
  • 3. Online Fraud in the Industry •  Under more pressure to deliver •  More and more competition à Increased need to deliver a excellent product and play •  Increase in sophistication of fraudsters •  Gone are the days when we see bad actors signing on using the same 50 email addresses •  Multiple communication channels between players •  Collusion – people are using multiple accounts in an attempt to defraud the system •  Increasing need for real-time risk assessment •  Understand what is going on in real-time to be able to protect yourself and understand who your customers are •  Maintaining customer trust •  Reducing customer attrition and maintaining customer trust is paramount With high levels of expected growth, the gaming industry is ! increasingly a target for highly sophisticated, organized fraud. © 2015 NuData Security, Inc.
  • 4. A World of Anonymity Players are sitting behind machines and you don’t really know who they are •  It is important to get to that next level where you’re not just dealing with a machine •  Truly understand who you are doing business with © 2015 NuData Security, Inc.
  • 5. What are the Risks? •  Monetary •  Reputation •  Card Schemes & Chargebacks •  Member Attrition •  Compliance •  Operational © 2015 NuData Security, Inc.
  • 6. What’s on the Line? The online gaming industry is estimated to be valued at £27 billion or $41.4 billion in 2015 Source:  Aite   © 2015 NuData Security, Inc.
  • 7. The Missing Layer KBAS Device Passwords (Knowledge) (Possessions) Basic. A password is either right or wrong, what more information do you have? Binary. What happens when a player changes their device? © 2015 NuData Security, Inc.
  • 8. The Secret Weapon User  Behavior  Biometrics © 2015 NuData Security, Inc.
  • 9. The Secret Weapon • Predictive Behavioral Biometrics •  A layered approach to understanding who a player is and how they are interacting in real-time. • Know the real user and understand their behavior •  How they interact with different devices? •  How the player moves across environment? • Know who to trust •  Is this truly the correct human interacting with your environment? © 2015 NuData Security, Inc.
  • 10. Where it Fits KBAS Behavior Device Passwords (Knowledge) (Ac2ons) (Possessions) Basic. A password is either right or wrong, what more information do you have? Binary. What happens when a player changes their device? Confidence. We know that this is the right user based on the way they are interacting. © 2015 NuData Security, Inc.
  • 11. What it Does Is the player behaving like a human? Is the player behaving like others? Is the player acting safely? Passively validates users using predictive behavioral biometrics •  Understand when there are deviations and emerging threats that don’t make sense within the environment © 2015 NuData Security, Inc.
  • 12. How? DeviceID Location Typing Angle of Device Scrolling Continuous Behavior Analysis User Actions Does this data, when all combined, make sense for who this user is and who we’re expecting them to be?   © 2015 NuData Security, Inc.
  • 13. The  Needle  in  the  Haystack © 2015 NuData Security, Inc. Why are we looking for the needle when all of that good hay is sitting there? •  The overwhelming majority of interactions within your online environment are from good, safe customers •  Identify those good customers and then that bad needle will make itself evident
  • 14. Do  you  know  your  users? © 2015 NuData Security, Inc. •  This is one of NuData’s customers logins over a 30 day period. What is safe in this environment and what is potentially risk? •  Layer risk on and start to clearly be able to see outliers who are doing things that don’t make sense – creating risk  
  • 15. Now  you  Know • The  risk  presented  by  exis6ng  and  new  customers   •  Understand  when  customers  are  crea6ng  risk   • When  it  is  the  correct  user  behind  the  account     • When  the  user  has  changed     •  Even  when  you  see  the  correct  devicea  and  the  correct  ID,  you   can  know  that  it’s  not  the  correct  person  who  has  logged  into   this  account   • Mul6  account  risk     • Who  you  can  trust     © 2015 NuData Security, Inc.
  • 16. When  You  Know  Who  to  Trust • Validate  trusted  users  early   • Reduce  fraud   • Accept  more  players  quickly,   reduce  risk       • Provide  quality  experience  for   trusted  players   •  Add  the  capability  of  being   predic6ve  about  who  your  good   customer  is   Offer  more.  Grow  Footprint.  Trust.       © 2015 NuData Security, Inc.
  • 17. Keep  Your  Good  Users   © 2015 NuData Security, Inc. •  What genuine users want: Trust & Safety without Friction •  You want a solution that can passively identify who your users are
  • 18. The  Big  Wins Reduce  false   posi.ves   Increase  trust   and  safety  for   all  users   across  all   devices.   Grow  Sales    Offer  higher   value  promos   to  trusted   users   Reduce   fric.on   Improve   Conversion   © 2015 NuData Security, Inc.
  • 19. Thank  You!   © 2015 NuData Security, Inc. download.nudatasecurity.com/user-behavior-analytics nudatasecurity.com @nudatasecurity