10.08.2017 Views

en_DS_Enhance-Authentication

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Enhance</strong> Auth<strong>en</strong>tication with Zero<br />

User Friction<br />

With the world sp<strong>en</strong>ding more and more time online, and more pot<strong>en</strong>t cyberattacks out there than<br />

ever before, traditional username/password combos are no longer an adequate way to protect<br />

your customers. Organizations need sophisticated, yet user-fri<strong>en</strong>dly verification strategies to<br />

protect against unauthorized logins and data breaches. The solution you have in place should be<br />

able to adapt to the ever-changing fraud threat landscape, but not be so string<strong>en</strong>t that your<br />

customers become inconv<strong>en</strong>i<strong>en</strong>ced or ev<strong>en</strong> frustrated by it.<br />

What if you could have the best of both worlds: strong protection against cyber threats, and zero<br />

<strong>en</strong>d-user friction? Now you can: with the latest in user auth<strong>en</strong>tication, you can stop hackers with a<br />

technology so transpar<strong>en</strong>t that your customers won't ev<strong>en</strong> know it's there.<br />

w w w . e a s y s o l . n e t


Device Id<strong>en</strong>tification: Auth<strong>en</strong>tication with Zero User Friction<br />

1<br />

An explosion in the number of devices popping up in homes and businesses — including desktop computers, laptops, mobile phones,<br />

tablets, smart TVs, and IOT devices — has left <strong>en</strong>terprises scrambling to properly control access to their resources. The fact that username<br />

and password combinations cannot be counted on as a layer of protection anymore only makes security an ev<strong>en</strong> more complex<br />

undertaking. This is compelling <strong>en</strong>terprises to look at adding layers of auth<strong>en</strong>tication wh<strong>en</strong> s<strong>en</strong>sitive data is retrieved, without<br />

compromising ease of use.<br />

Device id<strong>en</strong>tification technologies have be<strong>en</strong> around for a long time, usually as one of the main layers that <strong>en</strong>terprises have implem<strong>en</strong>ted<br />

to secure access while maintaining overall conv<strong>en</strong>i<strong>en</strong>ce. But many legacy device id<strong>en</strong>tification solutions were not built for the influx of new<br />

devices, nor are they ready for the natural drift caused by the updates, new apps or and ev<strong>en</strong> new fonts that are added to the devices over<br />

time.<br />

Easy Solutions provides browser id<strong>en</strong>tification using a unique heuristic-matching technology that takes expected changes into account to<br />

minimize unnecessary chall<strong>en</strong>ges or step-up auth<strong>en</strong>tication launches. It minimizes collision rates, maximizes accuracy over time, and is<br />

able to provide for better id<strong>en</strong>tification of known devices while reducing false positives for unfamiliar ones.<br />

Don't block your real customers – id<strong>en</strong>tify g<strong>en</strong>uine changes to their devices while detecting new devices which may be fraudul<strong>en</strong>t.<br />

5<br />

w w w . e a s y s o l . n e t 2


How Device Id<strong>en</strong>tification Works<br />

2<br />

Laptop, desktop and wireless devices are constantly changing. Plugins may be added or deleted, and users change the font size or type,<br />

adjust scre<strong>en</strong> brightness, clear cookies/cache to free up space, or update the operating system. This could cause device id<strong>en</strong>tification<br />

issues, as a device's specifications will not be exactly the same the next time that a user attempts to log into their account. But our device<br />

auth<strong>en</strong>tication algorithm adapts to these normal changes and maintains the ability to id<strong>en</strong>tify a device with precision after those changes<br />

occur, while still effectively detecting the changes that indicate the pres<strong>en</strong>ce of a new device.<br />

Wh<strong>en</strong> the <strong>en</strong>d user connects to an online business's website, a piece of JavaScript that has be<strong>en</strong> inserted into the login pages collects<br />

numerous characteristics on the device and browser. The collected data is passed from the back<strong>en</strong>d servers which th<strong>en</strong> analyze the<br />

information and perform device id<strong>en</strong>tification – ev<strong>en</strong> if the <strong>en</strong>d user is attempting a login while in 'incognito' or private browsing mode.<br />

The first step in analysis of the data is to create a hashed device ID and check if it matches previous device IDs used by the accountholder. If<br />

so, we can make a quick decision that the device has be<strong>en</strong> id<strong>en</strong>tified. This is just for speed though, and the solution doesn't stop there<br />

(which has be<strong>en</strong> the case in older solutions). If a match is not found, we th<strong>en</strong> perform a full analysis of the context data to determine if it is<br />

the same device, but with system changes made on it by the user.<br />

The solution also analyzes 10 critical variables that provide a good comparison of the curr<strong>en</strong>t device fingerprint to previous fingerprints in<br />

the database. For each of those variables, there is a unique comparison logic. For example, the way canvas elem<strong>en</strong>ts change and browser<br />

fonts change are analyzed in very differ<strong>en</strong>t ways. Each variable has a predetermined weight, or value, based on the probability that the<br />

variable will change. So if a change is detected on a variable with a high probability of changing, that change (no matter how big it is) will be<br />

considered low-weight, and will barely lower the total similarity perc<strong>en</strong>tage. This weighting is done in addition to the configurable<br />

weighting that we allow our cli<strong>en</strong>ts to configure. The critical device variables are as follows:<br />

· Fonts<br />

· Plugins<br />

· Canvas<br />

· Operating system<br />

· User ag<strong>en</strong>t<br />

· MIME types<br />

· Style colors<br />

· Scre<strong>en</strong> dim<strong>en</strong>sion<br />

· Navigator language<br />

· Browser name<br />

w w w . e a s y s o l . n e t 3


How Device Id<strong>en</strong>tification Works<br />

2<br />

These variables are all giv<strong>en</strong> a default weighting. The default values are based on our ext<strong>en</strong>sive testing and are the values with which we<br />

were able to achieve the lowest false-positive rate.<br />

The precise nature of our solution is reinforced with the following features:<br />

· Cookieless – Clearing cookies won't affect the id<strong>en</strong>tification of devices and will make the process more secure by not being subject<br />

to possible cookie theft.<br />

· Heuristic Approach – Device id<strong>en</strong>tification works by comparing a user's curr<strong>en</strong>t device to the device's fingerprint stored in<br />

the database.<br />

· Low Collision Rates – The chances of a device being confused for a similar one, a ph<strong>en</strong>om<strong>en</strong>on known as collision, is extremely low.<br />

· End User Whitelist – Once auth<strong>en</strong>ticated, the <strong>en</strong>d user can choose to add the new device to a whitelist of registered devices, or<br />

omit a device should it be public or insecure; for example, wh<strong>en</strong> on hotel lobby or internet café computers, or over unsecured Wi-Fi<br />

networks.<br />

Not only is our device id<strong>en</strong>tification effective at distinguishing registered user devices from first-time visitors (and pot<strong>en</strong>tially malicious<br />

devices) via web browsers; the solution also has a version that specifically caters to mobile apps. Software Developm<strong>en</strong>t Kits (SDKs) can be<br />

embedded into an online business's native mobile application to disp<strong>en</strong>se the same level of frictionless device auth<strong>en</strong>tication wh<strong>en</strong> users<br />

log in over the mobile app as they would wh<strong>en</strong> doing so over a web browser.<br />

The tolerance of the matching <strong>en</strong>gine can be configured, allowing it to act more string<strong>en</strong>tly or flexibly regarding what is considered to be a<br />

device match. This allows you to tune the system according to your <strong>en</strong>vironm<strong>en</strong>t, <strong>en</strong>suring that the appropriate level of acceptable degrees<br />

of change in the device is precisely measured.<br />

Multiple Dynamic Device Id<strong>en</strong>tification – Id<strong>en</strong>tify all of a user's devices, including those that are being updated<br />

or used in private browsing mode.<br />

w w w . e a s y s o l . n e t 4


Device Id<strong>en</strong>tification: Quick and Painless Integration<br />

3<br />

In addition, the importance and weighting of each group of variables can be configured. Such values are preconfigured based on our own<br />

research to give an out-of-the-box readiness which works for a global setup and device range, but this can be fine-tuned dep<strong>en</strong>ding on<br />

your <strong>en</strong>vironm<strong>en</strong>t and specific needs.<br />

This dynamic, adjustable approach to device-based user auth<strong>en</strong>tication provides your organization's IT departm<strong>en</strong>t with the freedom to<br />

strike a new kind of balance – betwe<strong>en</strong> rigid access only giv<strong>en</strong> to exact matches or a more a malleable access standard. Be too flexible, and<br />

pot<strong>en</strong>tially harmful access may be granted; but be too string<strong>en</strong>t and legitimate users may be forced to re-register their device almost every<br />

time they make a login attempt, leading to a kind of customer attrition not unlike other kinds of legacy user auth<strong>en</strong>tication.<br />

It is important to keep in mind that the biggest advantage device id<strong>en</strong>tification has over other types of auth<strong>en</strong>tication factors is its ability to<br />

be highly secure and yet nearly invisible to the <strong>en</strong>d user. A pleasant user experi<strong>en</strong>ce is just as important as the level of security, maybe ev<strong>en</strong><br />

more so. A happy customer is a long-term customer, but a frustrated customer is one that is considering switching to a competitor.<br />

w w w . e a s y s o l . n e t 5


About Easy Solutions<br />

Easy Solutions® is a security v<strong>en</strong>dor focused on the compreh<strong>en</strong>sive detection and prev<strong>en</strong>tion of electronic fraud across all devices,<br />

channels and clouds. Our products range from digital threat protection and secure browsing to multi-factor auth<strong>en</strong>tication and transaction<br />

anomaly detection, offering a one-stop shop for <strong>en</strong>d-to-<strong>en</strong>d fraud protection. The online activities of over 100 million customers at 385<br />

leading financial services companies, security firms, retailers, airlines and other <strong>en</strong>tities in the US and abroad are protected by the Easy<br />

Solutions Total Fraud Protection® platform.<br />

Easy Solutions is a proud member of key security and banking organizations, such as the APWG (Anti-Phishing Working Group), and FIDO<br />

(Fast ID<strong>en</strong>tity Online), and its Digital Threat Protection suite is <strong>en</strong>dorsed by the American Bankers Association (ABA).<br />

For more information, please visit<br />

http://www.easysol.net or follow us on Twitter:<br />

@goeasysol<br />

w w w . e a s y s o l . n e t s a l e s @ e a s y s o l . n e t<br />

w w w . e a s y s o l . n e t 10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!