SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Post on 15-Aug-2015

36 views 3 download

Tags:

Transcript of SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

SecuredTouchDetecting your personal touch

Management Team

Ran ShulkindVP Product & Co-

Founder

Yair FinziCEO & Co-Founder

Vast cyber security experience from IDF’s top cyber security unit

Graduated from Upwest labs startups accelerator in the Silicon Valley

Mobile fraud is on the rise

Existing solutions are not effective

Creating friction that reduces conversion

SecuredTouch changes the rules

Security

CurrentSolutions

High Security. Low Friction.

User Experience

All Rights Reserved © SecuredTouch™

Seamless & continuous identity verification for mobile applications

based on touchscreen behavior analytics

All Rights Reserved © SecuredTouch™

How it works?User’s touchscreen behavior is

analyzed during the entire session

At the moment of a transaction, user identity had already been verified

Legit users pass through without any friction while fraudsters get caught

All Rights Reserved © SecuredTouch™

Low Friction = High Conversion

User ExperienceAll Rights Reserved © SecuredTouch™

Collection of each user’s unique touchscreen usage parameters on the

device

Data is sent for deep inspection

Unique ML algorithm on the server-side continuously verifies users

identity

Technology

All Rights Reserved © SecuredTouch™

John

Cloud \ On-SiteAnalysis Server

App data

Touchscreenusage data

Customer’sServers

John?

Positive

Negative

or

John

Architecture

All Rights Reserved © SecuredTouch™

Product Statistics

Proprietary analytics system runs records and generates reports for

optimized performance

Enrollment and verification times, Acceptance and Rejection rates –

varies between different use cases

Specific information will be provided for each use case

All Rights Reserved © SecuredTouch™

Secured

Invisible

Efficient

Continuous authentication during the whole session

Detect account takeover by fraudsters, malware and robots

Seamless to the end user

Eliminate in-session security checks

No special sensors or challenges required

Cloud/On-prem Plug & play

SDK No special

permissions required

API for session risk assessment

Seamless Behavioral Security

All Rights Reserved © SecuredTouch™

www.SecuredTouch.comyair@securedtouch.comPalo Alto: +1 (650) 575 4564Tel-Aviv : +972 (54) 7744 243

Seamless Behavioral

Security