Securing the Last Mile: Continuous Mobile Authentication with SecuredTouch & IBM

May 9, 2017

We’ve almost become inured to the daily reports of data breaches, accepting it as a fact of life. Due to the massive volume of apps and the lack of strong, universal security standards, mobile devices are exceptionally vulnerable.

Sometimes the information or applications your customers or employees are using inherently add an additional layer of organizational risk. Employees may be accessing PII that would increase liability should the device be hacked, lost or stolen. Customers may be using their devices for financial transactions and demand higher limits than you are comfortable granting on an insecure mobile device.

Cybercriminals use a plethora of methods to take advantage, and implementing multiple layers of security is the only way to stop them.

Stronger security and an awesome user experience do not usually go together, but user-centric authentication using mobile behavioral biometrics increases functionality while reducing friction and fraud. That’s now easy to achieve, thanks to the integration of the IBM MobileFirstFoundation & SecuredTouch.

SecuredTouch technology improves the digital experience and reduces the log-in security hassle, reducing friction caused by passwords and tokens and rendering secondary account verifications such as “mother’s maiden name” questions unnecessary.

Participating in SecuredTouch requires no user education or enrollment. Its behavioral-based user-centric authentication is completely transparent but significantly strengthens security and privacy on the device.

SecuredTouch’s self-learning system analyzes how individual users physically interact with their mobile devices. It uses sensors already within the device such as the gyroscope, touch screen, and accelerometer, to collect more than 100 parameters – such as finger pressure, swipe speed, device movement, gesture boundaries, typing patterns – to build a unique profile for each user.

SecuredTouch is specifically tuned for mobile authentication. It tracks each user interaction to build a unique profile; its adaptive machine learning algorithms adjust the profile, based on a natural evolution of behaviors.

It increases functionality by enabling more transactions in the mobile channel, reducing false positives and accepting more transactions. It quickly detects account takeover, malware, and targeted attacks by continuously monitoring the user from login to logout and detects and differentiating between human vs. non-human behavior to catch suspicious activity in incubation before fraud occurs.

Integration is simple. SecuredTouch provides an SDK that can be implemented within an application in less than half a day. The rest of the system – risk scoring, business rules – is already implemented within the IBM MobileFirst Foundation.

We’ve becoming increasingly dependent on our mobile devices for everything. Protecting personal and corporate data while ensuring the ability to perform secure transactions is now absolutely critical for doing business. By adding SecuredTouch, you can enhance the user experience and strengthen security simultaneously.

See the official press release here.

Recent Posts

4 Reasons to Prioritize Mobile Fraud Prevention in 2021
Peak Season 2020: Account Takeover is Here to Stay and Other Takeaways
It's Time We Confront These Common Myths About Behavioral Biometrics
[Infographic] Breaking Down the Fraud Flow of Account Takeover
Emulator Fraud-as-a-Service: The Threat Landscape Continues to Evolve

Follow Us