neomia Pulse : Behavioral Biometrics MultiFactor Authentication - No Device & Passwordless
NEOMIA
neomia Pulse : Behavioral Biometrics MultiFactor Authentication - No Device & Passwordless
NEOMIA
neomia Pulse : Behavioral Biometrics MultiFactor Authentication - No Device & Passwordless
NEOMIA
Multi-Factor Authentication Platform by User Behavior Analysis
MFA device free- token free
Current challenges
The classical connection approach mainly based on static authentication (single or double factor), raises questions because how to certify that:
- Is the user the real trusted one?
- Is the user the same all the way long from login to logout?
- Is the data captured by a user, an automated process, or a robot?
- Is the used machine safe?
This approach cannot answer these questions because it does not detect either identifiers usurpation or compromise session.
Neomia Pulse innovative approach, powered by AI
neomia Pulse seamlessly and frictionlessly authenticates users, detects, and blocks suspicious activities through a combination of behavioral biometrics and contextual analysis.
In real time neomia Pulse collect:
- Date related to the typing behavior: Press time per key, Time between keys, Time per sequence
- Contextual data related to the equipment used: IP Adress, Device information, Browser information, User profile
neomia Pulse use cases
Pulse is an identity control and multifacor authentification (MFA) solution for All
Authentification
- All Users : Internal – external
- IOT : Maintainer (internal & external)
- Users in difficult conditions, unable to use two devices
- Population with low attendance: Work-study students, External contractors
- Hard-to-reach population: (foreign sites)
- Broad population: Students Patients Vendors
Control
- Supervision of generic accounts
- Online transactions and payments: Access to banking applications
- Securing the connection of IT administrators (internal and external) during "privileged" activities
- Identity theft during remote examination (Students, Professional certifications)
neomia Pulse is easy to integrate
neomia propose to integrate Pulse with tour IT infrastructure via API or standards protocols (OIDC/SAML)
Application domains
- Secondary authentication : Openning application
- Targeted Authentification : On demand in an application
- Primery authentification : Opening the operating system of a computer (connected)
- Multiple authentication: Log on to generic accounts
- Continuous authentication: Continuous authentication throughout the session
Specific focus – Gereric account
For various reasons (history, ease of use, etc.) generic accounts can be used, with associated risks:
- Lack of identity control;
- Risk of these accounts being used by non-legitimate persons without any possible detection;
Dissemination of these accounts by internal and/or external parties (partners, service providers) without any possible control
- N identity – One Account : Pulse manage many Identity on one ID
- Connexion : Pulse ca recognize who is connected on a generic account.
- Tracability : Administrator can know who is connected through a generic account