Endpoint

11/3/2016
12:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises

BioCatch's 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools

Tel Aviv, IL – November 3, 2016 – BioCatch, the global leader in behavioral biometrics, announced today it has launched its next-generation platform to optimize the implementation and performance of behavioral biometrics online and on mobile at the enterprise level. BioCatch currently protects more than 1 billion transactions per month, helping to significantly reduce fraud and identity theft.

The BioCatch 2.0 release supports extensive scalability requirements that enterprise customers demand, delivering rich data collection of behavioral parameters, and significantly broader identification of remote access Trojans, bots, aggregators, and malware. The new release features fast processing of risk-score calculation, providing real-time behavioral insights, as well as a new graphical user interface for the “Analyst Station”, BioCatch’s flagship analytics tool, enabling fraud teams to further investigate and analyze fraud cases.

“45% of online users experience malware and 25% experience account hacking according to a Kaspersky Lab Consumer Security Risks Survey issued in 2015. Compounded further by threats that are relentless and constantly changing, it is important to go beyond traditional fraud prevention and authentication methods and look for ways to ensure that a person is who they claim to be throughout an entire session, without creating friction in the user experience,” said Eyal Goldwerger, CEO of BioCatch. “Our customers require a solution which can passively and seamlessly distinguish a legitimate user from an imposter, providing information in real-time while preventing false alerts. BioCatch 2.0 is designed to stay ahead of the curve, capturing maximum data points and providing the tools that make it easier for fraud and security analysts to do their job.”

BioCatch 2.0 highlights include:

·         Improved Data Collection and Optimized Scoring – Continuous data collection is done not only within pages, but in between pages.

·         Faster Processing – Score calculation is done in less than 500 milliseconds with predictable server response times and no spikes. Additionally, failed login sessions are stored and can be used to track bots or fraudsters performing multiple attempts at login with different credentials.   

·         Smaller Footprint – The JavaScript code that is implemented on company websites, which enables the BioCatch data capture, is significantly lighter, allowing pages to load faster and data collection to occur seamlessly.

·         New Analytics Tools – Search capabilities are expanded to cover more parameters, and analysis of search results is improved. Also included is expanded mobile app analytics, including analysis of mobile users’ tap and acceleration behaviors.

·         Enhanced Robotic and Malware Detection – Protection against various aggregators and malware, including Ramnit.

For more detailed information on BioCatch 2.0, please visit www.biocatch.com.

About BioCatch

BioCatch is a cybersecurity company that delivers behavioral biometric solutions, analyzing human-device interactions to protect users and data. Banks and other enterprises use BioCatch to significantly reduce online fraud and protect against a variety of cyber threats, without compromising the user experience. With an unparalleled patent portfolio and deployments at major banks around the world that cover tens of millions of users to date, BioCatch has established itself as the industry leader. For more information, please visit www.biocatch.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3937
PUBLISHED: 2018-08-14
An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability...
CVE-2018-3938
PUBLISHED: 2018-08-14
An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST r...
CVE-2018-12537
PUBLISHED: 2018-08-14
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
CVE-2018-12539
PUBLISHED: 2018-08-14
In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows,...
CVE-2018-3615
PUBLISHED: 2018-08-14
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.