Endpoint
11/3/2016
12:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises

BioCatch's 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools

Tel Aviv, IL – November 3, 2016 – BioCatch, the global leader in behavioral biometrics, announced today it has launched its next-generation platform to optimize the implementation and performance of behavioral biometrics online and on mobile at the enterprise level. BioCatch currently protects more than 1 billion transactions per month, helping to significantly reduce fraud and identity theft.

The BioCatch 2.0 release supports extensive scalability requirements that enterprise customers demand, delivering rich data collection of behavioral parameters, and significantly broader identification of remote access Trojans, bots, aggregators, and malware. The new release features fast processing of risk-score calculation, providing real-time behavioral insights, as well as a new graphical user interface for the “Analyst Station”, BioCatch’s flagship analytics tool, enabling fraud teams to further investigate and analyze fraud cases.

“45% of online users experience malware and 25% experience account hacking according to a Kaspersky Lab Consumer Security Risks Survey issued in 2015. Compounded further by threats that are relentless and constantly changing, it is important to go beyond traditional fraud prevention and authentication methods and look for ways to ensure that a person is who they claim to be throughout an entire session, without creating friction in the user experience,” said Eyal Goldwerger, CEO of BioCatch. “Our customers require a solution which can passively and seamlessly distinguish a legitimate user from an imposter, providing information in real-time while preventing false alerts. BioCatch 2.0 is designed to stay ahead of the curve, capturing maximum data points and providing the tools that make it easier for fraud and security analysts to do their job.”

BioCatch 2.0 highlights include:

·         Improved Data Collection and Optimized Scoring – Continuous data collection is done not only within pages, but in between pages.

·         Faster Processing – Score calculation is done in less than 500 milliseconds with predictable server response times and no spikes. Additionally, failed login sessions are stored and can be used to track bots or fraudsters performing multiple attempts at login with different credentials.   

·         Smaller Footprint – The JavaScript code that is implemented on company websites, which enables the BioCatch data capture, is significantly lighter, allowing pages to load faster and data collection to occur seamlessly.

·         New Analytics Tools – Search capabilities are expanded to cover more parameters, and analysis of search results is improved. Also included is expanded mobile app analytics, including analysis of mobile users’ tap and acceleration behaviors.

·         Enhanced Robotic and Malware Detection – Protection against various aggregators and malware, including Ramnit.

For more detailed information on BioCatch 2.0, please visit www.biocatch.com.

About BioCatch

BioCatch is a cybersecurity company that delivers behavioral biometric solutions, analyzing human-device interactions to protect users and data. Banks and other enterprises use BioCatch to significantly reduce online fraud and protect against a variety of cyber threats, without compromising the user experience. With an unparalleled patent portfolio and deployments at major banks around the world that cover tens of millions of users to date, BioCatch has established itself as the industry leader. For more information, please visit www.biocatch.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.