Date post: | 15-Aug-2015 |
Category: |
Technology |
Upload: | israel-mobile-summit |
View: | 36 times |
Download: | 3 times |
SecuredTouchDetecting your personal touch
Management Team
Ran ShulkindVP Product & Co-
Founder
Yair FinziCEO & Co-Founder
Vast cyber security experience from IDF’s top cyber security unit
Graduated from Upwest labs startups accelerator in the Silicon Valley
Mobile fraud is on the rise
Existing solutions are not effective
Creating friction that reduces conversion
SecuredTouch changes the rules
Security
CurrentSolutions
High Security. Low Friction.
User Experience
All Rights Reserved © SecuredTouch™
Seamless & continuous identity verification for mobile applications
based on touchscreen behavior analytics
All Rights Reserved © SecuredTouch™
How it works?User’s touchscreen behavior is
analyzed during the entire session
At the moment of a transaction, user identity had already been verified
Legit users pass through without any friction while fraudsters get caught
All Rights Reserved © SecuredTouch™
Low Friction = High Conversion
User ExperienceAll Rights Reserved © SecuredTouch™
Collection of each user’s unique touchscreen usage parameters on the
device
Data is sent for deep inspection
Unique ML algorithm on the server-side continuously verifies users
identity
Technology
All Rights Reserved © SecuredTouch™
John
Cloud \ On-SiteAnalysis Server
App data
Touchscreenusage data
Customer’sServers
John?
Positive
Negative
or
John
Architecture
All Rights Reserved © SecuredTouch™
Product Statistics
Proprietary analytics system runs records and generates reports for
optimized performance
Enrollment and verification times, Acceptance and Rejection rates –
varies between different use cases
Specific information will be provided for each use case
All Rights Reserved © SecuredTouch™
Secured
Invisible
Efficient
Continuous authentication during the whole session
Detect account takeover by fraudsters, malware and robots
Seamless to the end user
Eliminate in-session security checks
No special sensors or challenges required
Cloud/On-prem Plug & play
SDK No special
permissions required
API for session risk assessment
Seamless Behavioral Security
All Rights Reserved © SecuredTouch™