A boost from better biometrics
Solutions based on consumer behavior and interactional signals now lead the way to provide more customer safety with less friction on their experience and less fraud in the marketplace. An excellent example of balancing security and user experience is the layering of behavioral biometrics with solutions such as Mastercard’s Identity Check Mobile or fingerprint sensors.
Passive biometrics can track the angle of a handheld device when in use, the pressure applied to the keys or screen or the length of gaps between typing and swiping. These can separate good users from bad and these signals are virtually impossible for a non-human interface to replicate. Anomalous behavior can be identified by analyzing these signals—even in large data sets—and by comparing the patterns of known human users with unusual patterns.
Technology solutions can now tell machines from humans; then separate good machines from bad; select known humans from unknown humans; and finally sort unknown humans demonstrating low-risk signals from unknowns with high-risk signals. This process lets organizations fast track the known and low-risk users for an optimal experience—and that saves the friction and traditional authentication methods for the highest risk users.
Integrated authentication that begins with physical biometrics (such as facial recognition or a fingerprint) needs behavioral analytics and risk decisioning to help create robust offerings.
It also provides banks and financial institutions with a unique and powerful ability to secure transactions and improve verification authenticity.
Until banks move to a multi-modal approach, their remote banking app will remain vulnerable. Unfortunately, so too will be the trust of their most loyal customers.
Want more Banking Strategies? Sign up for our free newsletter!
Robert Capps is authentication strategist, vice president for NuData Security. He is a recognized technologist, thought leader and advisor with more than 20 years of experience in the design, management, and protection of complex information systems to counter cyber risks.