Endpoint

11/3/2016
12:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises

BioCatch's 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools

Tel Aviv, IL – November 3, 2016 – BioCatch, the global leader in behavioral biometrics, announced today it has launched its next-generation platform to optimize the implementation and performance of behavioral biometrics online and on mobile at the enterprise level. BioCatch currently protects more than 1 billion transactions per month, helping to significantly reduce fraud and identity theft.

The BioCatch 2.0 release supports extensive scalability requirements that enterprise customers demand, delivering rich data collection of behavioral parameters, and significantly broader identification of remote access Trojans, bots, aggregators, and malware. The new release features fast processing of risk-score calculation, providing real-time behavioral insights, as well as a new graphical user interface for the “Analyst Station”, BioCatch’s flagship analytics tool, enabling fraud teams to further investigate and analyze fraud cases.

“45% of online users experience malware and 25% experience account hacking according to a Kaspersky Lab Consumer Security Risks Survey issued in 2015. Compounded further by threats that are relentless and constantly changing, it is important to go beyond traditional fraud prevention and authentication methods and look for ways to ensure that a person is who they claim to be throughout an entire session, without creating friction in the user experience,” said Eyal Goldwerger, CEO of BioCatch. “Our customers require a solution which can passively and seamlessly distinguish a legitimate user from an imposter, providing information in real-time while preventing false alerts. BioCatch 2.0 is designed to stay ahead of the curve, capturing maximum data points and providing the tools that make it easier for fraud and security analysts to do their job.”

BioCatch 2.0 highlights include:

·         Improved Data Collection and Optimized Scoring – Continuous data collection is done not only within pages, but in between pages.

·         Faster Processing – Score calculation is done in less than 500 milliseconds with predictable server response times and no spikes. Additionally, failed login sessions are stored and can be used to track bots or fraudsters performing multiple attempts at login with different credentials.   

·         Smaller Footprint – The JavaScript code that is implemented on company websites, which enables the BioCatch data capture, is significantly lighter, allowing pages to load faster and data collection to occur seamlessly.

·         New Analytics Tools – Search capabilities are expanded to cover more parameters, and analysis of search results is improved. Also included is expanded mobile app analytics, including analysis of mobile users’ tap and acceleration behaviors.

·         Enhanced Robotic and Malware Detection – Protection against various aggregators and malware, including Ramnit.

For more detailed information on BioCatch 2.0, please visit www.biocatch.com.

About BioCatch

BioCatch is a cybersecurity company that delivers behavioral biometric solutions, analyzing human-device interactions to protect users and data. Banks and other enterprises use BioCatch to significantly reduce online fraud and protect against a variety of cyber threats, without compromising the user experience. With an unparalleled patent portfolio and deployments at major banks around the world that cover tens of millions of users to date, BioCatch has established itself as the industry leader. For more information, please visit www.biocatch.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.
CVE-2018-11501
PUBLISHED: 2018-05-26
PHP Scripts Mall Website Seller Script 2.0.3 has CSRF via user_submit.php?upd=2.
CVE-2018-11503
PUBLISHED: 2018-05-26
The isfootnote function in markdown.c in libmarkdown.a in DISCOUNT 2.2.3a allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file, as demonstrated by mkd2html.
CVE-2018-11504
PUBLISHED: 2018-05-26
The islist function in markdown.c in libmarkdown.a in DISCOUNT 2.2.3a allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file, as demonstrated by mkd2html.
CVE-2018-11494
PUBLISHED: 2018-05-26
The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containi...