Endpoint

11/3/2016
12:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises

BioCatch's 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools

Tel Aviv, IL – November 3, 2016 – BioCatch, the global leader in behavioral biometrics, announced today it has launched its next-generation platform to optimize the implementation and performance of behavioral biometrics online and on mobile at the enterprise level. BioCatch currently protects more than 1 billion transactions per month, helping to significantly reduce fraud and identity theft.

The BioCatch 2.0 release supports extensive scalability requirements that enterprise customers demand, delivering rich data collection of behavioral parameters, and significantly broader identification of remote access Trojans, bots, aggregators, and malware. The new release features fast processing of risk-score calculation, providing real-time behavioral insights, as well as a new graphical user interface for the “Analyst Station”, BioCatch’s flagship analytics tool, enabling fraud teams to further investigate and analyze fraud cases.

“45% of online users experience malware and 25% experience account hacking according to a Kaspersky Lab Consumer Security Risks Survey issued in 2015. Compounded further by threats that are relentless and constantly changing, it is important to go beyond traditional fraud prevention and authentication methods and look for ways to ensure that a person is who they claim to be throughout an entire session, without creating friction in the user experience,” said Eyal Goldwerger, CEO of BioCatch. “Our customers require a solution which can passively and seamlessly distinguish a legitimate user from an imposter, providing information in real-time while preventing false alerts. BioCatch 2.0 is designed to stay ahead of the curve, capturing maximum data points and providing the tools that make it easier for fraud and security analysts to do their job.”

BioCatch 2.0 highlights include:

·         Improved Data Collection and Optimized Scoring – Continuous data collection is done not only within pages, but in between pages.

·         Faster Processing – Score calculation is done in less than 500 milliseconds with predictable server response times and no spikes. Additionally, failed login sessions are stored and can be used to track bots or fraudsters performing multiple attempts at login with different credentials.   

·         Smaller Footprint – The JavaScript code that is implemented on company websites, which enables the BioCatch data capture, is significantly lighter, allowing pages to load faster and data collection to occur seamlessly.

·         New Analytics Tools – Search capabilities are expanded to cover more parameters, and analysis of search results is improved. Also included is expanded mobile app analytics, including analysis of mobile users’ tap and acceleration behaviors.

·         Enhanced Robotic and Malware Detection – Protection against various aggregators and malware, including Ramnit.

For more detailed information on BioCatch 2.0, please visit www.biocatch.com.

About BioCatch

BioCatch is a cybersecurity company that delivers behavioral biometric solutions, analyzing human-device interactions to protect users and data. Banks and other enterprises use BioCatch to significantly reduce online fraud and protect against a variety of cyber threats, without compromising the user experience. With an unparalleled patent portfolio and deployments at major banks around the world that cover tens of millions of users to date, BioCatch has established itself as the industry leader. For more information, please visit www.biocatch.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7682
PUBLISHED: 2018-06-22
Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.
CVE-2018-12689
PUBLISHED: 2018-06-22
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.