Behavior Biometrics The silent revolution in digital fingerprinting
Rui Melo BiscaiaWatchful Software
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2
Some “house rules” on this Webinar
1 You are muted centrally. You don’t need to mute/unmute yourself
2This webinar is being recorded.You’ll have access to it on-demand on www.watchfulsoftware.com
3The Q&A session will be at the end.You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel
SpeakerRui Melo Biscaia
Director of Product Management & Strategic Accounts
Watchful Software
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
How secure are our Digital Identities?
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
How secure are our Digital Identities?
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
Behavior Biometrics in a nutshell
1 Monitors for identity theft attempts by means of analyzing typing patterns of users
2 Continually verifies users’ identities as they type during each windows session in an on-going basis
3 Requiring no hardware, is a software only solution, that understands who the user is in less than a tweet
4 Complements any Intrusion Detection System, or 2FA, by adding a behavior biometric layer
5 Works with any language, works with any app, works with any content
6 Runs in the background, transparent to the user, and never asking for dedicated text input
7 Delivers mitigation actions – Screenshot, Photo, Lock screen, E-mail, Text authentication screen, etc…
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6
Behavior Biometrics - Use Cases
What if someone tries to impersonate me send emails or post on my behalf?
How can the system tackle it and prevent that from happening?
What if a student allows another person to take the exam once he/she has entered the login details?
How can the system identify that the student taking the exam is actually him/her and not someone else?
What if someone knows or steals your login credentials?
How can the system understand and react to the fact that that the person using the computer is not you?
Is someone else logged in my computer?
Is someone trying to impersonate me in
social media?Is someone cheating on this online exam?
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
Passive Enrollment and Dynamic Profiling
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
TypeWATCH is Behavior Biometrics
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
TypeWATCH: Product suite offer
4 Individuals WEB
To the enterprise Managed centrally Enforcement of
policies Security Roles &
Levels Monitor alarms User based
mitigation actions
Enterprise
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
TypeWATCH Enterprise
To the enterprise Managed centrally Enforcement of
policies Security Roles &
Levels Monitor alarms User based
mitigation actions
Enterprise
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 11
TypeWATCH Enterprise
To the enterprise Managed centrally Enforcement of
policies Security Roles &
Levels Monitor alarms User based
mitigation actions
Enterprise
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 12
TypeWATCH Enterprise
To the enterprise Managed centrally Enforcement of
policies Security Roles &
Levels Monitor alarms User based
mitigation actions
Enterprise
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 13
TypeWATCH: Product suite offer
To end-users/mass market
Download and start using it. No server.
Freemium pricing model
Also used for POCs and demoing the product
4 Individuals WEBEnterprise
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14
TypeWATCH for Individuals
To end-users/mass market
Download and start using it. No server.
Freemium pricing model
Also used for POCs and demoing the product
4 Individuals
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15
TypeWATCH: Product suite offer
To the enterprise providing web-based services
Does not require a client agent to be installed
Applies to a website or web platform
4 Individuals WEBEnterprise
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16
6 (tech) reasons why TypeWATCH
Precise Delivers 98% plus accuracy and makes it virtually impossible to mimic another person's typing pattern
Persistent Constantly assesses typing samples against a legitimate user’s stored dynamic pattern
DynamicOffsets tiredness, switching and or sharing of computers / keyboards, mood, influence of alcohol and medications, etc, and sets individual thresholds to every user to increase performance
Simple There is no special hardware needed as with other biometrics – a standard keyboard is sufficient
Safe Data verification is provided between the input (keyboard) to the matching algorithm (even with remote desktop typing)
Auditable An intruder can be identified by means of matching the typing sample against the profile database.
Behavior Biometrics The silent revolution in digital fingerprinting
Rui Melo BiscaiaWatchful Software
Top Related