Continuous Authentication for Endpoint Protection
BioTracker is a tool that continuously authenticates your end users without them having to do more than their day-to-day work. By monitoring the way they type on their keyboard or use the mouse, we can accurately detect if someone else is using a workstation that was left unlocked or has remotely taken over the machine.
Decide what to do when a threat is detected
Once a possible intrusion is detected, you get to control what happens:
- Log the user out and have them re-authenticate
- Warn and allow the user to indicate that this is a false alarm
- Alert the administrator of the possible intrusion
- Take preventative actions silently (such as reducing network permissions)
- Log the data in the background for later forensics
Control System Sensitivity
You decide how strict the system should be when deciding if the user is actually the authorized user.
BioTracker is highly configurable, and sensitivity levels can be set for different groups of users. Decide what to do for each group, the risk level for each user, and then use all this information to decide how to act.
Detect threats in seconds, not days.
Using Artificial Intelligence to learn your behavior
BioTracker uses artificial intelligence to build a behavioral biometric profile on the end user by tracking the way they use their keyboard and mouse. It takes less than a day of regular usage to learn the way the user types on the keyboard, after which, BioTracker starts protecting the workstation.
BioTracker doesn't stop learning after the initial enrollment. Human nature and behavior has a natural variance over time, which is why BioTracker constantly learns these variances. It even allows false alarms to be flagged to force the variant behavior to be included in the user profile.
Group users into different risk levels
Your end users are not one-size fits all. BioTracker allows you to choose how to protect each user by placing them into a risk-level group based on their access to sensitive information or over-all privileges on your infrastructure.
You get to decide the settings for each group:
- The sensitivity of the matching algorithim
- Whether to track keyboard, mouse, or both
- What to do when an intrusion is detected
- What mitigation options you prefer to balance between security and user experience within your organization.
Frictionless Second or Third-Factor authentication
You can now provide a continuous second or third-factor authentication for your infrastructure without inconveniencing your users. BioTracker can be installed silently and remotely. You get to decide if the agent visible to the end user.
BioTracker silently provides identity assurance as the end users go about their daily work, without any effort from the users or administrators.
Track, view, and monitor usage in real-time
You can see your users and authentication logs, manage your system, and configure system behavior from the BioTracker admin console.
Mitigate against threats
By using BioTracker, you are protecting your network against account take over (ATO), password sharing, remote hacking, and seat sharing schemes.
Regulatory Compliance without user frustration
Implement second or third-factor authentication for your users without inconveniencing them, while meeting compliance standard such HIPAA, NIST, SOX, and other cyber-security regulations.
Government & Military
Continuous authentication that cannot be faked or stolen.
Task attribution for regulated industries.
Banking & Financial Services
Multi-factor authentication invisible to end users.
Protect health data and meet HIPAA requirements with Proof of Presence.