Overview
Behavioral technologies are more and more becoming serious contenders in using biometrics to ensure information and system security. Advances in mobile computing, with the appearance of smart devices, and the increasing needs of security in critical areas such as finance and government are major drivers of the biometric security field. Behavioral characteristics are traits that are learned or acquired based on human actions. Examples of behavioral traits include keystroke dynamics, mouse dynamics, gesture dynamics, signature dynamics, voice and gait features.
Pluripass
Pluripass is an anti-fraud solution for web applications, online transactions and web accessible login screens. Pluripass combines passive behavioral biometrics with cognitive, contextual and network signals in our risk engine to detect and take action on attackers in real-time. Our patented solution captures how users interact with mouse, keyboard and or/touchscreens to compute a unique biometric signature for that user.

Biotracker
Biotracker delivers continuous authentication on desktops. We protect the entire user session against unauthorized access by comparing a users unique behavioral biometric profile against the current user. Protect against password sharing, insider threats and remote access trojans with our patented technology, and without requiring any hardware. This is unparalleled proactive security compared to traditional reactive solutions used today.

Features
Pluripass
Main Benefits
- Protects online web systems
- Reduce fraud
- Reduce user friction when authenticating web and mobile users
Key Features
- No user impact (invisible to users)
- Fast authentication (0.2ms to compute biometric match)
- Easy integration (1 line javascript code)
Protects Against
- Botnets
- Remote Access Trojans
- (RAT-In-the-Middle)
- Phishing
- Account Takeover
- Advanced Persistent Threats
- Keyloggers
Biotracker
Who Needs This
- Financial Services (Anti Money Laundering, Internal Compliance) [FFIEC]
- Payments [PCI-DSS]
- Critical Infrastructure (Energy, Water, Chemical, Oil & Gas) [NERC-SIP]
- Healthcare(Patient data) [HIPAA]
- Federal/Defense [NIST]
- Manufacturing (Intellectual Property)
What Do We Do
- Protecting against internal threats
- Protecting against rogue priviledged accounts
- Meeting compliance regulations (HIPAA, PCI-DSS, NERC-CIP, NIST)
- Meet governance requirements for cyber security, intelligence gathering, information sharing
Features
- Continuous authentication
- Audit-ready logging
- Data exposed via standard API for Information Sharing
- Easy to use dashboard for Intelligence Gathering
- Windows-native client
- Passive user enrollment
Protects Against
- Man-in-the-Middle
- Remote Administration Tool
- Insider Attacks
- Spear Phishing
- Lone Wolf
- Password Sharing
- Advanced Persistant Threats
Deployments
Typical Deployment Plurpass

Typical Deployment Biotracker

Knowledge Base
-
Data Behavior Analytics — DBA
The Challenge
Perimeter and Network Security tools lack visibility into the data activities, which leads to lateral east-west originating threats against critical business data assets.
Solutions Benefits
Identify, classify, and track regulated or sensitive data within databases and tie all activity to the exact origination of data accessReal-time actions can be taken based on behavioral analysis and audit resultsUser-configurable content rules that meet regulations relating to personally...
Read More ...
-
Risk Assessment Report
How much is prevention worth when you are in the midst of responding to a data breach?Prevention is necessary but detection is paramount in ensuring that you know who is accessing your sensitive data. Many organizations are still not reacting fast enough to intruders; and compromises are detected months after a breach occurrence. The cost of a breach is a function of lost time to discovery – the faster you can detect and block, the faster you can recover your losses.
Solution Benefits
Generate risk...
Read More ...
Documents