SlideShare a Scribd company logo
Password Problem – SOLVED!
An entirely new approach to security:
Know who is there by how they type
A BIG Problem …
Passwords are
ineffective
Passwords are
valuable targets
Password alternatives
are breached
Solutions
hacked
Fingerprint biometrics
@ geek.com
Mar 2011 – Comodo Certs
Sep 2011 – DigiNotar Certs
Mar 2011 – RSA SecurID
Social Media
Sites hacked
Mar 2013 – 50M
Passwords
Jun 2012 – 6.5M
accounts
Feb 2013 – 250k
passwords
Retailers
hacked
Nov-Dec 2013 – 110M
accounts
May 2014 – 145M
accounts
Jan 2014 – 1.1M
accounts
How We Solve It
my username
my password
my valuable data
$
Our Solution
A new biometric approach to security…
Recognize users typing characteristics …
• Known text (e.g., passwords)
• Unrestricted text (e.g., e-mail)
• Activities on the desktop (foreground / background)
… without capturing any content
Our products answer …
is it them?
is it still them?
when is it occurring?
what are they doing?
where are they?
combined - context-aware, strongly
authenticated computing
what else is going on?
TickStream® ActivityTickStream® KeyID
Our Edge
Strong authentication and awareness with …
• Nothing to remember
• No personally identifiable information (PII)
• Nothing to carry around
• Nothing to be shared
• Nothing to maintain
• UNIQUE biometrics –
(ours can be changed
or withdrawn)
Products
Attributes
security
no
memory
no
PII
no
equipment
no
maintenance
low
cost
easy to
use
Intensity Analytics       
Passwords       
Tokens       
Fingerprints       
Facial recognition       
 Good
 Okay
 Poor
Comparison
The Factors of Authentication
Security is based on the presentation of evidence of identity
when the user attempts to sign in:
 Knowledge factor: something you know
 Ownership factor: something you have
 Inherence factor: something you are
What we add is new:
 Behavioral factor: something you do
TickStream.KeyID makes it possible for the computer to observe
how you behave in a well-defined context – passively through your
keyboard as you enter your username and password.
Benefits over existing solutions
• Security
– More difficult to impersonate than other biometrics – helps defeat replay attacks
– It's not a "copy" that can be duplicated, but rather behavior that has to be performed in real-time
– Can discern input from the keyboard vs. malware – helps defeat key-loggers and other types of malware
– All data is encrypted - Network traffic via SSL & at-rest data via AES-256
• Privacy
– No Personally Identifiable Information (PII) is generated or stored
• Implementation
– Transparency - quickly add a biometric factor to existing password-based systems
– Flexibility - tune to the appropriate level of security depending on the assets being protected
– Application agnostic - no training required to identify specific application details, patterns, etc.
– Broad platform support - native Windows applications or any web application regardless of platform
– No OEM or open source components – 100% our IP
– Enterprise scalability and simple component design
• Usability
– Frictionless - people just keep working as usual – minimize negative impact to user experience
– Uses ubiquitous hardware – no need for specialized readers or scanners
– Improved user experience - reduce password complexity rules and forced password expiration
Use Cases
• Authentication
– Web applications
– VPN access
– Use as multi-factor authentication
– Password self-service (without using PII): eliminate password reset calls to help desk
• Constant Validation
– Authenticate all transactions within a session
– Strong non-repudiation (biometric digital signature – prove the negative)
– Detect when unauthorized personnel access an open system
• Fraud Detection and Monitoring
– Detect when users change (keyboard & password sharing, license violations)
– Identify and differentiate multi-user access to generic and role accounts
– Automate detection of breached accounts
• Software License Management
– Eliminate shared credentials
– Identify unused licenses
The Competition
Fingerprint
Tokens
Cell phones
One-time
codes
Hardware-
based
biometrics
Passwords
Popular
alternatives
Widely
used
Unpopular
alternatives
Gaining
traction
● 3M Cogent, Inc
● Aware, Inc
● BIO-key International, Inc
● Cross Match Technologies, Inc
● DigitalPersona, Inc
● Fujitsu Ltd
● Lumidigm, Inc
● M2SYS LLC
● NEC Corporation
● SAFRAN SA
● Siemens AG
● Suprema, Inc
● ZKTeco, Inc
Biometric vendors abound
3 Reasons To Buy ….
• Costs Less
– Than other biometrics and token-based systems: it’s entirely software-based
– Training costs are a fraction of other security solutions
– Support costs are a fraction of other security solutions
– Integration costs are a fraction of other security solutions
– Password self-service (without using PII): eliminate password reset calls to help desk
• Enhanced User Experience
– No more need to memorize complex passwords
– No more need to change passwords every 30 days, 90 days, etc.
• Better Performance
– Than other biometrics (proven by published independent 3rd-Party validation)
– False Acceptance Rates as good as or better than fingerprint, retinal / iris scans, facial
scans, voice recognition
What other solution combines all three advantages?
Bottom Line
Nobody Likes Passwords
Passwords ARE Dying
We Solve That!
Let’s Get Started!
Kevin Spanbauer
VP, Business Development
Intensity Analytics Corporation
kspanbauer@intensityanalytics.com
www.intensityanalytics.com
(952) 250-0836

More Related Content

PPTX
Mobile Security for the Enterprise
PPTX
Two factor authentication 2018
PDF
Solving problems with authentication
PPTX
Two Factor Authentication
PPTX
Modern Cyber Threat Protection techniques for Enterprises
PPTX
Authentication(pswrd,token,certificate,biometric)
PPTX
FrontOne our new and different solutions
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Mobile Security for the Enterprise
Two factor authentication 2018
Solving problems with authentication
Two Factor Authentication
Modern Cyber Threat Protection techniques for Enterprises
Authentication(pswrd,token,certificate,biometric)
FrontOne our new and different solutions
IoT Security: Debunking the "We Aren't THAT Connected" Myth

What's hot (20)

PPTX
Iot security and Authentication solution
PPTX
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PPTX
Seminar-Two Factor Authentication
PPT
Eds user authenticationuser authentication methods
PPT
Electronic Authentication More Than Just A Password
PPTX
Login cat tekmonks - v3
PPTX
Two Factor Authentication: Easy Setup, Major Impact
PDF
ciphertet presentation given at TADHack-mini Orlando
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PDF
We Know Your Type
PDF
Generic threats to mobile application
PPTX
Understanding passwordless technologies
PDF
Two factor authentication
PPTX
Insights Into Modern Day Threat Protection
PPTX
Draft SP 800-157 - Derived PIV Credentials
PPTX
Logincat MFA and SSO
PDF
2 factor authentication 3 [compatibility mode]
PDF
Two-factor Authentication
Iot security and Authentication solution
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
2012 12-04 --ncc_group_-_mobile_threat_war_room
Seminar-Two Factor Authentication
Eds user authenticationuser authentication methods
Electronic Authentication More Than Just A Password
Login cat tekmonks - v3
Two Factor Authentication: Easy Setup, Major Impact
ciphertet presentation given at TADHack-mini Orlando
Threat Modeling - Locking the Door to Vulnerabilities
We Know Your Type
Generic threats to mobile application
Understanding passwordless technologies
Two factor authentication
Insights Into Modern Day Threat Protection
Draft SP 800-157 - Derived PIV Credentials
Logincat MFA and SSO
2 factor authentication 3 [compatibility mode]
Two-factor Authentication
Ad

Similar to Password Problem - Solved! (20)

PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
PPTX
Aligning Application Security to Compliance
PPTX
Identity and Security in the Cloud
PDF
Zero Passwords, Maximum Security The Future of Digital Identity.pdf
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
Office 365 Security Features That Nonprofits Should Know and Use
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
Understanding Zero Trust Security for IBM i
DOCX
CHAPTER 7 Authentication and Authorization On
PPTX
Challenges2013
PPTX
CS5300 class presentation on managing information systems
PPTX
Protect your Database with Data Masking & Enforced Version Control
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Community IT Innovators - IT Security Best Practices
Marcos de Pedro Neoris authenware_cybersecurity step1
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Aligning Application Security to Compliance
Identity and Security in the Cloud
Zero Passwords, Maximum Security The Future of Digital Identity.pdf
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Office 365 Security Features That Nonprofits Should Know and Use
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Understanding Zero Trust Security for IBM i
CHAPTER 7 Authentication and Authorization On
Challenges2013
CS5300 class presentation on managing information systems
Protect your Database with Data Masking & Enforced Version Control
Wfh security risks - Ed Adams, President, Security Innovation
Community IT Innovators - IT Security Best Practices
Ad

Recently uploaded (20)

PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
System and Network Administration Chapter 2
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Nekopoi APK 2025 free lastest update
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Essential Infomation Tech presentation.pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Introduction to Artificial Intelligence
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Softaken Excel to vCard Converter Software.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Reimagine Home Health with the Power of Agentic AI​
System and Network Administration Chapter 2
Which alternative to Crystal Reports is best for small or large businesses.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
Upgrade and Innovation Strategies for SAP ERP Customers
Nekopoi APK 2025 free lastest update
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Essential Infomation Tech presentation.pptx
PTS Company Brochure 2025 (1).pdf.......
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Wondershare Filmora 15 Crack With Activation Key [2025
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
L1 - Introduction to python Backend.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Design an Analysis of Algorithms I-SECS-1021-03
Introduction to Artificial Intelligence
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...

Password Problem - Solved!

  • 1. Password Problem – SOLVED! An entirely new approach to security: Know who is there by how they type
  • 2. A BIG Problem … Passwords are ineffective Passwords are valuable targets Password alternatives are breached Solutions hacked Fingerprint biometrics @ geek.com Mar 2011 – Comodo Certs Sep 2011 – DigiNotar Certs Mar 2011 – RSA SecurID Social Media Sites hacked Mar 2013 – 50M Passwords Jun 2012 – 6.5M accounts Feb 2013 – 250k passwords Retailers hacked Nov-Dec 2013 – 110M accounts May 2014 – 145M accounts Jan 2014 – 1.1M accounts
  • 3. How We Solve It my username my password my valuable data $
  • 4. Our Solution A new biometric approach to security… Recognize users typing characteristics … • Known text (e.g., passwords) • Unrestricted text (e.g., e-mail) • Activities on the desktop (foreground / background) … without capturing any content
  • 5. Our products answer … is it them? is it still them? when is it occurring? what are they doing? where are they? combined - context-aware, strongly authenticated computing what else is going on? TickStream® ActivityTickStream® KeyID
  • 6. Our Edge Strong authentication and awareness with … • Nothing to remember • No personally identifiable information (PII) • Nothing to carry around • Nothing to be shared • Nothing to maintain • UNIQUE biometrics – (ours can be changed or withdrawn) Products Attributes security no memory no PII no equipment no maintenance low cost easy to use Intensity Analytics        Passwords        Tokens        Fingerprints        Facial recognition         Good  Okay  Poor Comparison
  • 7. The Factors of Authentication Security is based on the presentation of evidence of identity when the user attempts to sign in:  Knowledge factor: something you know  Ownership factor: something you have  Inherence factor: something you are What we add is new:  Behavioral factor: something you do TickStream.KeyID makes it possible for the computer to observe how you behave in a well-defined context – passively through your keyboard as you enter your username and password.
  • 8. Benefits over existing solutions • Security – More difficult to impersonate than other biometrics – helps defeat replay attacks – It's not a "copy" that can be duplicated, but rather behavior that has to be performed in real-time – Can discern input from the keyboard vs. malware – helps defeat key-loggers and other types of malware – All data is encrypted - Network traffic via SSL & at-rest data via AES-256 • Privacy – No Personally Identifiable Information (PII) is generated or stored • Implementation – Transparency - quickly add a biometric factor to existing password-based systems – Flexibility - tune to the appropriate level of security depending on the assets being protected – Application agnostic - no training required to identify specific application details, patterns, etc. – Broad platform support - native Windows applications or any web application regardless of platform – No OEM or open source components – 100% our IP – Enterprise scalability and simple component design • Usability – Frictionless - people just keep working as usual – minimize negative impact to user experience – Uses ubiquitous hardware – no need for specialized readers or scanners – Improved user experience - reduce password complexity rules and forced password expiration
  • 9. Use Cases • Authentication – Web applications – VPN access – Use as multi-factor authentication – Password self-service (without using PII): eliminate password reset calls to help desk • Constant Validation – Authenticate all transactions within a session – Strong non-repudiation (biometric digital signature – prove the negative) – Detect when unauthorized personnel access an open system • Fraud Detection and Monitoring – Detect when users change (keyboard & password sharing, license violations) – Identify and differentiate multi-user access to generic and role accounts – Automate detection of breached accounts • Software License Management – Eliminate shared credentials – Identify unused licenses
  • 10. The Competition Fingerprint Tokens Cell phones One-time codes Hardware- based biometrics Passwords Popular alternatives Widely used Unpopular alternatives Gaining traction ● 3M Cogent, Inc ● Aware, Inc ● BIO-key International, Inc ● Cross Match Technologies, Inc ● DigitalPersona, Inc ● Fujitsu Ltd ● Lumidigm, Inc ● M2SYS LLC ● NEC Corporation ● SAFRAN SA ● Siemens AG ● Suprema, Inc ● ZKTeco, Inc Biometric vendors abound
  • 11. 3 Reasons To Buy …. • Costs Less – Than other biometrics and token-based systems: it’s entirely software-based – Training costs are a fraction of other security solutions – Support costs are a fraction of other security solutions – Integration costs are a fraction of other security solutions – Password self-service (without using PII): eliminate password reset calls to help desk • Enhanced User Experience – No more need to memorize complex passwords – No more need to change passwords every 30 days, 90 days, etc. • Better Performance – Than other biometrics (proven by published independent 3rd-Party validation) – False Acceptance Rates as good as or better than fingerprint, retinal / iris scans, facial scans, voice recognition What other solution combines all three advantages?
  • 12. Bottom Line Nobody Likes Passwords Passwords ARE Dying We Solve That!
  • 13. Let’s Get Started! Kevin Spanbauer VP, Business Development Intensity Analytics Corporation kspanbauer@intensityanalytics.com www.intensityanalytics.com (952) 250-0836