TypeWATCH provides persistent post-authentication security for critical systems and, if an intruder is detected, it automatically applies the security policies defined by the organization, retaining an auditable record for compliance purposes.
Biometric systems are rapidly gaining acceptance as cybercrimes have proven that old authentication methods (such as ID/password combinations and tokens) have become too easily defeated (theft, sniffing, hacking, etc.). However, most biometric systems involve complex, expensive hardware components, which can make the systems financially and logistically impractical.
TypeWATCH recognizes a person by the way he/she types on a keyboard, regardless of what the text input might be, as they continue to interact with a system. As opposed to standard authentication techniques (such as passwords or tokens) that validate only on sign-on, the e-biometric technology continually analyzes input to persistently ensure that the users are who they claim to be, ensuring protection against stolen/copied/hacked passwords or even malware bots.
TypeWATCH also provides a forensic audit trail tool, for compliance purposes, to use in the event of suspected unauthorized access attempt. As it is a software-only solution – with no biometric hardware requirements, such as expensive and complex biometric readers – it is simple to deploy and easy to maintain and, at the same time, is designed to run transparently to the user.
The system employs continuous learning algorithms to offset for fatigue, switching or sharing of computers/keyboards and mood, and avoids standard privacy concerns since it does not register or log actual text or content being typed.
“For decades, we have relied on a simple ‘two-pronged key’ to allow us into virtually any computer system on the planet: the veritable userID/password combination. In today’s world, it has been proven time and again that this same basic authentication structure is an insufficient barrier to entry to most systems, from home banking, to gaming, to mission critical infrastructure. However, by and large we haven’t progressed past that old ‘two pronged key’ approach to opening even the most important systems,” states Rui Melo Biscaia, Watchful Software’s Product Development Director.