Data sheets

By enabling the user journey from identity proofing, authentication, monitoring online sessions and beyond in the web and mobile channel, BioCatch supports a multi-channel strategy generating significant returns on investment for top tier clients around the world. Learn more about our capabilities with these data sheets.

Policy Manager

The Policy Manager allows fraud teams to define the actions that should take place depending on the various system outputs, streamlining the implementation process and heightening the usability of the BioCatch system. Going beyond simply providing a best-of-breed risk score, the BioCatch Policy Manager offers flexibility in establishing the actions that should occur if the user behavior inside a session triggers a predefined condition. Instead of building rules based on 0-1000 ranges that have to be well-understood for a particular environment, the Policy Manager allows fraud analysts to benefit from added logic that mitigates fraud in real-time, simplifies back-end operations and assists with gathering data for proactive, investigative analysis.


Using Behavioural Biometrics to Combat Vishing and APP Fraud

According to a recent UK Finance report, British banking customers lost £500m to fraudulent schemes in the first half of 2018 alone, the majority of which came from “unauthorised fraud” (i.e., hacking of user accounts.) During these six months, there were 3,866 confirmed cases of vishing (“authorised fraud” or “impersonation”) in the UK, with the scams leading to £36.6M in losses, for an average loss in excess of £9,000 per person.
The problem is most acute in the UK but is not limited to that country. These types of scams are on the rise everywhere. The European Commission has revealed that it is looking into ways to address this vexing challenge. In the U.S., the Federal Trade Commission has reported that 77% of its fraud complaints involve contacts by telephone, of which vishing is a subset. Most recently, the Australian Taxation Office has issued a warning on the rise of this threat.


Something You Have vs. Something You Are: Differences Between Device Recognition and Behavioral Biometrics

The ongoing cat-and-mouse game between fraudsters and security experts has generated a variety of methods to prevent identity theft and ease the authentication process. Behavioral biometrics upends the paradigm, profiling and analyzing user behavior as opposed to what they have or what they know. These are the main differences between device recognition methods (something you have) and behavioral biometrics (something you are).


BioCatch Analyst Station

The BioCatch Analyst Station is a web-based interface that displays the data for one or many sessions and provides summary reports. The portal enables the customer to easily detect and act upon possible fraudulent activity in user accounts. The BioCatch Analyst Station is used for post-session data analysis, typically at the end of each day or whenever required by the administrator.


Protecting Payroll Systems From Account Takeovers

Payroll systems are the life line of any company or organization. Typically, these systems assemble critical financial functions such as salaries, tax deductions, benefits, business-to-business payments, supplier bills and tax returns.


Behavioral Biometrics in a P2P World

In recent years, Peer to Peer payments have shown a significant increase, passing the $120 billion mark (2017). Currently, one in three American consumers uses P2P apps to make instant payments to friends, relatives, service providers, or anyone they owe money. Since P2P account opening does not require identity verification, it is vulnerable to various types of fraud and threats including malware, social engineering, remote access, SIM swapping, call forwarding and other techniques. Using these techniques, the fraudsters are able to exploit two main points of failure:


Behavioural Biometrics in a PSD2 World

Two major implications of PSD2 are Access to Account and Strong Customer Authentication. PSD2 also requires TPPs to meet strict criteria and maintain very low fraud rates in order to stay active in the marketplace. In many ways, these requirements upend the financial ecosystem by holding various players responsible for different aspects of the payment process. This makes it difficult for all parties involved to prevent fraud and at the same time provide customers with a positive user experience.


What is Behavioral Biometrics?

Behavioral biometrics is a breakthrough cybersecurity technology that identifies people by how they do what they do, rather than by what they are (e.g., fingerprint, face), what they know (e.g. secret question, password) or what they have (e.g. token, SMS one-time code). Behavioral biometrics measures and analyzes patterns in human activities. Historically, these included keystroke patterns, gait, signature and the like. Today’s advanced behavioral biometric techniques capture an array of human interactions between a device and an application, such as hand-eye coordination, pressure, hand tremors, navigation, scrolling and other finger movements, etc.


Mitigating the Risk of Insurance Fraud with Behavioral Biometrics

The global insurance market is a multi-trillion-dollar market worth more than $4.5 trillion in gross insurance premiums (2015). In 2016, the gross insurance in premiums in the U.S reached $2.67 trillion with $1.5 trillion in paid claims.


Behavioral Biometrics for Mobile Payments

Digital transformation in banking and retail is rapidly evolving. In this fast-moving environment, where finance and fraud intersect, there are several ramifications for financial institutions and the user experience.

The equation is quite simple: where there is money, there is fraud. As the use of mobile banking grows, so do the threats of hacks, malware and other remote attacks. Traditional means of detecting fraud can take considerable time and resources, sometimes taking weeks to detect or to confirm an incident.

In the digital world - whether mobile payments, e-commerce or online banking – this is much too long. Transactions happen quickly, and any delay can have significant repercussions, both from a consumer confidence perspective and a cost perspective. In the digital world, it seems there is always a choice to make between security and the user experience.