SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

13
SecuredTouch Detecting your personal tou

Transcript of SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Page 1: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

SecuredTouchDetecting your personal touch

Page 2: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Management Team

Ran ShulkindVP Product & Co-

Founder

Yair FinziCEO & Co-Founder

Vast cyber security experience from IDF’s top cyber security unit

Graduated from Upwest labs startups accelerator in the Silicon Valley

Page 3: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Mobile fraud is on the rise

Page 4: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Existing solutions are not effective

Creating friction that reduces conversion

Page 5: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

SecuredTouch changes the rules

Security

CurrentSolutions

High Security. Low Friction.

User Experience

All Rights Reserved © SecuredTouch™

Page 6: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Seamless & continuous identity verification for mobile applications

based on touchscreen behavior analytics

All Rights Reserved © SecuredTouch™

Page 7: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

How it works?User’s touchscreen behavior is

analyzed during the entire session

At the moment of a transaction, user identity had already been verified

Legit users pass through without any friction while fraudsters get caught

All Rights Reserved © SecuredTouch™

Page 8: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Low Friction = High Conversion

User ExperienceAll Rights Reserved © SecuredTouch™

Page 9: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Collection of each user’s unique touchscreen usage parameters on the

device

Data is sent for deep inspection

Unique ML algorithm on the server-side continuously verifies users

identity

Technology

All Rights Reserved © SecuredTouch™

Page 10: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

John

Cloud \ On-SiteAnalysis Server

App data

Touchscreenusage data

Customer’sServers

John?

Positive

Negative

or

John

Architecture

All Rights Reserved © SecuredTouch™

Page 11: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Product Statistics

Proprietary analytics system runs records and generates reports for

optimized performance

Enrollment and verification times, Acceptance and Rejection rates –

varies between different use cases

Specific information will be provided for each use case

All Rights Reserved © SecuredTouch™

Page 12: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

Secured

Invisible

Efficient

Continuous authentication during the whole session

Detect account takeover by fraudsters, malware and robots

Seamless to the end user

Eliminate in-session security checks

No special sensors or challenges required

Cloud/On-prem Plug & play

SDK No special

permissions required

API for session risk assessment

Seamless Behavioral Security

All Rights Reserved © SecuredTouch™

Page 13: SecuredTouch - Israel Mobile Summit 2015 Startup Contest Presentation

[email protected] Alto: +1 (650) 575 4564Tel-Aviv : +972 (54) 7744 243

Seamless Behavioral

Security