BioCatch Mobile exits beta

Source: BioCatch

BioCatch, the global leader in Cognitive Biometrics, announced today that BioCatch Mobile is now out of Beta. BioCatch Mobile provides both authentication and threat detection across mobile banking platforms, while minimizing friction for end users.

Bank customers are increasingly turning to mobile devices to make transactions and conduct mobile payments. Mobile banking services are seeking ways to introduce new functionality without having to mitigate the added risk of fraud by implementing additional, visible security measures, resulting in friction for the customer and negatively impacting their user experience.

BioCatch offers completely transparent, behind-the-scenes authentication and threat detection capabilities that can protect against fraud attacks while improving user experience. The authentication function creates a cognitive biometric signature which takes into account physiological factors such as left/right handedness, press-size, hand tremor and eye-hand coordination, as well as Cognitive traits, such as usage preferences and device interaction patterns. Contextual factors include device ID, device preference, network access and geolocation.

BioCatch Mobile’s threat detection capability combines cognitive behavioral analysis and other means to identify the typical signs of account takeover and live malware manipulation attacks on mobile applications. The threat detection function identifies multiple types of “Man-in-the-Mobile” and remote access (RAT) attacks, risk indicators such as jailbroken/rooted devices, and behavior consistent with criminal modus operandi.

“BioCatch Mobile was developed specifically to assist banks in mitigating the risks associated with the mobile channel, allowing them to add new functionality without admitting new fraud or creating new friction,” said BioCatch CEO Benny Rosenbaum. “What makes our solution so unique is the fact it’s completely transparent, works behind the scenes, and yet is far more secure than traditional two-factor authentication as it goes beyond what the user knows or has.”

Comments: (0)