TypeWATCH: Advanced persistent e-biometrics
Posted on 28 March 2013.
Watchful Software released TypeWATCH 1.2, an e-biometrics solution that leverages the science of Keystroke Dynamics to identify and authenticate users simply by the way they interact with their system.


TypeWATCH provides persistent post-authentication security for critical systems and, if an intruder is detected, it automatically applies the security policies defined by the organization, retaining an auditable record for compliance purposes.

Biometric systems are rapidly gaining acceptance as cybercrimes have proven that old authentication methods (such as ID/password combinations and tokens) have become too easily defeated (theft, sniffing, hacking, etc.). However, most biometric systems involve complex, expensive hardware components, which can make the systems financially and logistically impractical.

TypeWATCH recognizes a person by the way he/she types on a keyboard, regardless of what the text input might be, as they continue to interact with a system. As opposed to standard authentication techniques (such as passwords or tokens) that validate only on sign-on, the e-biometric technology continually analyzes input to persistently ensure that the users are who they claim to be, ensuring protection against stolen/copied/hacked passwords or even malware bots.

TypeWATCH also provides a forensic audit trail tool, for compliance purposes, to use in the event of suspected unauthorized access attempt. As it is a software-only solution – with no biometric hardware requirements, such as expensive and complex biometric readers – it is simple to deploy and easy to maintain and, at the same time, is designed to run transparently to the user.

The system employs continuous learning algorithms to offset for fatigue, switching or sharing of computers/keyboards and mood, and avoids standard privacy concerns since it does not register or log actual text or content being typed.

“For decades, we have relied on a simple ‘two-pronged key’ to allow us into virtually any computer system on the planet: the veritable userID/password combination. In today’s world, it has been proven time and again that this same basic authentication structure is an insufficient barrier to entry to most systems, from home banking, to gaming, to mission critical infrastructure. However, by and large we haven’t progressed past that old ‘two pronged key’ approach to opening even the most important systems,” states Rui Melo Biscaia, Watchful Software’s Product Development Director.





Spotlight

Biggest ever cyber security exercise in Europe is underway

Posted on 30 October 2014.  |  More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA).


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //