https://store-images.s-microsoft.com/image/apps.53840.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.c095360e-0c63-4665-84d5-3f62c2fc85e9

neomia Pulse : Behavioral Biometrics MultiFactor Authentication - No Device & Passwordless

NEOMIA

neomia Pulse : Behavioral Biometrics MultiFactor Authentication - No Device & Passwordless

NEOMIA

Multi-Factor Authentication Platform by User Behavior Analysis MFA device free- token free

Current challenges

The classical connection approach mainly based on static authentication (single or double factor), raises questions because how to certify that:

  • Is the user the real trusted one?
  • Is the user the same all the way long from login to logout?
  • Is the data captured by a user, an automated process, or a robot?
  • Is the used machine safe?

This approach cannot answer these questions because it does not detect either identifiers usurpation or compromise session.


Neomia Pulse innovative approach, powered by AI

neomia Pulse seamlessly and frictionlessly authenticates users, detects, and blocks suspicious activities through a combination of behavioral biometrics and contextual analysis.

In real time neomia Pulse collect:

  • Date related to the typing behavior: Press time per key, Time between keys, Time per sequence

  • Contextual data related to the equipment used: IP Adress, Device information, Browser information, User profile

neomia Pulse use cases

Pulse is an identity control and multifacor authentification (MFA) solution for All

Authentification

  • All Users : Internal – external
  • IOT : Maintainer (internal & external)
  • Users in difficult conditions, unable to use two devices
  • Population with low attendance: Work-study students, External contractors
  • Hard-to-reach population: (foreign sites)
  • Broad population: Students Patients Vendors

Control

  • Supervision of generic accounts
  • Online transactions and payments: Access to banking applications
  • Securing the connection of IT administrators (internal and external) during "privileged" activities
  • Identity theft during remote examination (Students, Professional certifications)

neomia Pulse is easy to integrate

neomia propose to integrate Pulse with tour IT infrastructure via API or standards protocols (OIDC/SAML)


Application domains

  • Secondary authentication : Openning application
  • Targeted Authentification : On demand in an application
  • Primery authentification : Opening the operating system of a computer (connected)
  • Multiple authentication: Log on to generic accounts
  • Continuous authentication: Continuous authentication throughout the session

Specific focus – Gereric account

For various reasons (history, ease of use, etc.) generic accounts can be used, with associated risks:

  • Lack of identity control;
  • Risk of these accounts being used by non-legitimate persons without any possible detection;

Dissemination of these accounts by internal and/or external parties (partners, service providers) without any possible control

  • N identity – One Account : Pulse manage many Identity on one ID
  • Connexion : Pulse ca recognize who is connected on a generic account.
  • Tracability : Administrator can know who is connected through a generic account

https://store-images.s-microsoft.com/image/apps.61607.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.43f4e457-ddd0-412c-a098-07914eb39f65
/staticstorage/d7f9a19/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.61607.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.43f4e457-ddd0-412c-a098-07914eb39f65
/staticstorage/d7f9a19/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.41666.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.45ec82ad-dad5-4342-8c05-48c5dc5f8e01
/staticstorage/d7f9a19/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.58422.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.c4a78740-db87-4848-b6bd-9cf7f0742c0f
/staticstorage/d7f9a19/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.49545.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.f8a36750-1a54-41fc-9b55-d342466f77e8
/staticstorage/d7f9a19/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.9865.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.d24825e4-af4a-441e-8edf-2e8c5d13b9f3
https://store-images.s-microsoft.com/image/apps.42487.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.be5b1572-82aa-4a88-a538-cd7b89b72e3e
https://store-images.s-microsoft.com/image/apps.29123.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.46e1e244-89cb-4a40-a150-d068453a520a
https://store-images.s-microsoft.com/image/apps.52879.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.ebfd930f-7863-4fe9-9467-2c2432d85606
https://store-images.s-microsoft.com/image/apps.35425.8f442954-a757-4c7d-b301-02d3fd9e6eaa.ae6b3704-70bf-4c08-adcc-a8f7fe3df820.80350c31-c491-4968-a690-283eedd2fe78