Resource Center

Webinar

A Look at Frictionless Authentication

The paradigm for identity risk management and authentication is changing. In the new paradigm, context and data available for a specific type of interaction must drive analytics. Instead of just looking for commonality, we need to make better use of data that is unique.

DOWNLOAD Webinar

Data Sheet

Something You Have vs. Something You Are: Differences Between Device Recognition and Behavioral Biometrics

The ongoing cat-and-mouse game between fraudsters and security experts has generated a variety of methods to prevent identity theft and ease the authentication process. Behavioral biometrics upends the paradigm, profiling and analyzing user behavior as opposed to what they have or what they know. These are the main differences between device recognition methods (something you have) and behavioral biometrics (something you are).

DOWNLOAD Data Sheet

Webinar

What Keeps a Bank's CFO Up at Night - The True Cost of Cyber Fraud To Your Business

Fraudsters are ever-evolving and constantly discovering new methods of stealing money from institutions worldwide. The drive to digital transformation is providing new opportunities for fraudsters to exploit businesses and consumers remotely. The losses from cybercrime continue to rise year-after-year with the number of cyber incidents targeting businesses nearly doubling between 2016 and 2017 according to the Online Trust Alliance. 2018 is not showing any reduction in these trends.

DOWNLOAD Webinar

Data Sheet

Protecting Payroll Systems From Account Takeovers

Payroll systems are the life line of any company or organization. Typically, these systems assemble critical financial functions such as salaries, tax deductions, benefits, business-to-business payments, supplier bills and tax returns.

DOWNLOAD Data Sheet

Data Sheet

Behavioral Biometrics in a P2P World

In recent years, Peer to Peer payments have shown a significant increase, passing the $120 billion mark (2017). Currently, one in three American consumers uses P2P apps to make instant payments to friends, relatives, service providers, or anyone they owe money. Since P2P account opening does not require identity verification, it is vulnerable to various types of fraud and threats including malware, social engineering, remote access, SIM swapping, call forwarding and other techniques. Using these techniques, the fraudsters are able to exploit two main points of failure:

DOWNLOAD Data Sheet

Case Study

A Top-5 U.S. Bank Detects TrickBot Malware Attacks with BioCatch’s Behavioral Biometrics Solution

Malware infections and Remote Access Trojan (RAT) attacks are on the rise, enabling cyber criminals to take over accounts from afar and automate fraud. Despite traditional fraud detection measures and cybersecurity safeguards, malware and RAT attacks remain prevalent. Undetected malware attacks can result in direct losses to account holders and have a long-term detrimental effect on business and customer confidence.

DOWNLOAD Case Study

Webinar

The Fast and the Fraudulent

The world of payments is rapidly-changing. The rise of P2P payments in the U.S, Canada and Australia along with dramatic regulatory changes in Europe (PSD2), has created new opportunities across the ecosystem. New third-party payment providers (TPP's) in the EU and P2P apps in other regions are entering the arena by supporting the rapid rise in demand and associated adoption rates. Banks are enabling direct access to accounts via APIs. Consumers now get to pick which apps they use, how they want to pay, and when, making the user experience paramount to win their loyalty. At the same time, however, the speed and “openness” makes the ecosystem  vulnerable to several types of threats including malware, social engineering, remote access Trojans, SIM swapping, call forwarding and other techniques. Using these techniques, the fraudsters are able to exploit various points of potential weakness: at the account creation stage, the bank account linking process and payment authentication.

DOWNLOAD Webinar

Data Sheet

Behavioural Biometrics in a PSD2 World

Two major implications of PSD2 are Access to Account and Strong Customer Authentication. PSD2 also requires TPPs to meet strict criteria and maintain very low fraud rates in order to stay active in the marketplace. In many ways, these requirements upend the financial ecosystem by holding various players responsible for different aspects of the payment process. This makes it difficult for all parties involved to prevent fraud and at the same time provide customers with a positive user experience.

DOWNLOAD Data Sheet

Webinar

The Role of Applicant Behavior in Identity Proofing

As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use.

DOWNLOAD Webinar

White Paper

From Login to Logout: Continuous Authentication with Behavioral Biometrics

In recent years, a growing number of organizations have employed two-factor authentication (2FA) as a primary safeguard mechanism. They all share the notion that requiring a second security layer will be instrumental in reducing data breaches and identity theft. Two-factor authentication is based on the fundamental assumption that at least two out of three authentication factors are used in the process (“something you know, something you have, something you are”). 2FA is not a new security measure, nevertheless, it is in extensive use, despite the growing recognition that it is not so effective.

DOWNLOAD White Paper

White Paper

The Role of Applicant Behavior in Identity Proofing

As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use. To achieve the necessary balance between preventing fraud and providing a delightful experience for consumers, an approach to identity proofing that accounts for the channel, product, customer, and threat environment is absolutely critical. But regardless of the approach, inconspicuous solutions — like those based on applicant behavior — have a distinct role to play in how institutions manage the risk of application fraud.

DOWNLOAD White Paper

Webinar

Combining Risk Based and Continuous Biometric Authentication in Financial Services

With account fraud rising and large amounts of personal information already compromised, financial institutions realize the shortcomings of basic passwords and OTPs and the need for biometric authentication to bolster security and enable a seamless user experience. However, many biometric platforms still use knowledge-based information to enroll customers, which makes it easy for hackers to create new accounts using personal identifying information.

DOWNLOAD Webinar

Data Sheet

What is Behavioral Biometrics?

Behavioral biometrics is a breakthrough cybersecurity technology that identifies people by how they do what they do, rather than by what they are (e.g., fingerprint, face), what they know (e.g. secret question, password) or what they have (e.g. token, SMS one-time code). Behavioral biometrics measures and analyzes patterns in human activities. Historically, these included keystroke patterns, gait, signature and the like. Today’s advanced behavioral biometric techniques capture an array of human interactions between a device and an application, such as hand-eye coordination, pressure, hand tremors, navigation, scrolling and other finger movements, etc.

DOWNLOAD Data Sheet

Webinar

The Evolution of Money and Biometrics | Webinar | BioCatch

On November 8, 2017 FindBiometrics and Money20/20 presented the live webcast, "The Evolution of Money and Biometrics." Reporting on the heels of Money20/20, FindBiomerics President Peter O'Neill reviewed the biggest FinTech biometrics news out of the world’s premier financial conference, before handing the presentation to Maxine Most, Principal, Acuity Market Intelligence, who presented her firm's latest guidance. Acuity’s research set the stage for a dynamic discussion of biometrics and identity in the financial space featuring expert panelists: Bianca Lopes, Chief Identity Officer, BioConnect; Frances Zelazny, VP Marketing, BioCatch; and Sanjib Kalita, Chief Marketing Officer, Money20/20.

DOWNLOAD Webinar

Webinar

Reducing Insurance Fraud with Behavioral Biometrics | BioCatch

There are many faces of fraud in the insurance market - using stolen identities to obtain a new policy - or just as troubling, an account takeover to make a false claim or change payee information to receive claim funds. And when fraud hits, it hurts everyone in the pool. In fact, according to the Federal Bureau of Investigation (FBI), annual losses related to insurance fraud is approximately $40 billion, costing the average American family $400-$700 in increased premiums each year.

DOWNLOAD Webinar

White Paper

Digital Transformation in the Insurance Sector

The widespread digitization of financial services is causing large-scale and sweeping transformations across various facets of the business, creating new growth opportunities but also new challenges and inherent risk. In the insurance sector, particularly, digital transformation is driven by new competitive threats, ongoing cost pressures, aging technology and increasing regulatory requirements. Put all together, there is a huge opportunity to modernize, to create new business models, acquire customers on new channels and create competitive and compelling customer experiences.

DOWNLOAD White Paper

Data Sheet

Mitigating the Risk of Insurance Fraud with Behavioral Biometrics

The global insurance market is a multi-trillion-dollar market worth more than $4.5 trillion in gross insurance premiums (2015). In 2016, the gross insurance in premiums in the U.S reached $2.67 trillion with $1.5 trillion in paid claims.

DOWNLOAD Data Sheet

Data Sheet

Behavioral Biometrics for Mobile Payments

Digital transformation in banking and retail is rapidly evolving. In this fast-moving environment, where finance and fraud intersect, there are several ramifications for financial institutions and the user experience.

The equation is quite simple: where there is money, there is fraud. As the use of mobile banking grows, so do the threats of hacks, malware and other remote attacks. Traditional means of detecting fraud can take considerable time and resources, sometimes taking weeks to detect or to confirm an incident.

In the digital world - whether mobile payments, e-commerce or online banking – this is much too long. Transactions happen quickly, and any delay can have significant repercussions, both from a consumer confidence perspective and a cost perspective. In the digital world, it seems there is always a choice to make between security and the user experience.

DOWNLOAD Data Sheet

Data Sheet

Enhance Identity Proofing with Behavioral Biometrics

New Account Fraud is usually the gateway to many other follow on crime and is a growing concern for businesses that processes transactions online. Traditional fraud prevention measures are often too little, too late, forcing banks, credit card issuers and other data brokers to look for new ways to verify identities and recognize the alarming rates of fraud that has emerged in this area.

DOWNLOAD Data Sheet

Data Sheet

Real-Time Fraud Detection Through Continuous Authentication

With cyber-attackers becoming much more sophisticated, security measures must get smarter too. The key is to implement security measures that continuously monitor and test the authenticity of users in ways that are difficult to replicate. Many experts and market leaders agree: behavioral biometric profiling is the only effective way to achieve this level of security.

DOWNLOAD Data Sheet

Data Sheet

What Is Behavioral Biometrics?

Behavioral biometrics is a breakthrough cybersecurity technology that identifies people by how they do what they do, rather than by what they are (e.g., fingerprint, face), what they know (e.g. secret question, password) or what they have (e.g. token, SMS one-time code). Behavioral biometrics measures and analyzes patterns in human activities. Historically, these included keystroke patterns, gait, signature and the like.

DOWNLOAD Data Sheet

White Paper

Invisible Challenges to Detect Fraud | White Paper | BioCatch

BioCatch is a cybersecurity company that delivers behavioral biometrics, analyzing human device interactions, to protect users and data. Banks and other enterprises use BioCatch to significantly reduce online fraud and protect against a variety of cyber threats, without compromising the user experience.

DOWNLOAD White Paper

Webinar

Global Trends in Online Fraud: 2016-2017 | Webinar | BioCatch

BioCatch works with leading banks around the world and monitors more than 2 billion transactions per month. Join us as we provide a summary of fraudulent activity gathered via our behavioral biometrics platform in 2016, review the latest trends in online fraud and share some insights as to what 2017 will bring.

DOWNLOAD Webinar

White Paper

RATs & Protecting Online Banking | White Paper | BioCatch

Remote Administration Tools (RATs) have a dual purpose. Their original objective was to allow IT personnel to remotely access computers connected to the network, so they can run troubleshooting or remote maintenance on the PC. Many people use remote access capabilities because it allows them to enter their far-away desktop and control it, just like they were sitting behind the keyboard themselves.

DOWNLOAD White Paper

White Paper

Preventing Fraud in the Mobile Era | White Paper | BioCatch

As mobile devices eclipse computers and laptops as the preferred method of going online, fraudsters have followed users, porting their modus operandi –account takeover, social engineering, and malware based remote control attacks – to the mobile arena. Mobile has opened up many new ways for users to communicate and connect without being tied to a desk or a power outlet – and at the same time, it has presented hackers with many more opportunities to perpetrate fraud and carry out attacks that cannot be detected with traditional tools used to detect attacks in web sites. As a result, companies need to apply new fraud controls to protect mobile users and enable them to carry out transactions, check bank accounts, make purchases, etc.

DOWNLOAD White Paper