Behavioral Biometrics: What is it, and how can it enhance your security?
You may have heard about behavioral biometrics. It is the latest technology within the complex landscape of IT security, but what is it and how does it work exactly?
Behavioral biometrics is the unique field of study of individual and unique patterns when using your mouse and keyboard. Each individual has their own pattern which cannot be similar to that of anyone else. The difference between behavioral biometrics and physical biometrics is that physical biometrics relates to unique fingerprint and iris patterns, whereas behavioral biometrics refers to the measurement and identification of unique human traits unique to each individual.
Behavioral biometrics verifies and identifies keystroke dynamics, motion analysis, voice ID, the characteristics of how you use your mouse, signature analysis and all cognitive biometrics. In short, all your behavioral activities that makes you.

Behavioral biometrics with ReTrust
Powered by IBM Trusteer, the innovative and advanced technology behind ReTrust leverages new behavioral biometrics capability, using patterned machine learning and analytics which enables real-time cognitive fraud detection.
Behavioral biometrics is used to secure authentication primarily in financial institutes, but with the launch of ReTrust, making IBM Trusteer available in an as-a-Service model, this technology can now be scaled to companies of all sizes and is relevant for any company that has an online website or app.
The ReTrust technology starts with seamlessly analyzing all mouse activity, such as mouse velocity, trajectory, jerk, curve, distance and clicking. Based on this, the system creates a unique ID and the system understands sudden mouse movements and clicks cognitively and in context to meaning and purpose – all in real-time. Along with this, the system also recognizes fraud indicators such as remote access tool, device spoofing, phishing and malware. It then simultaneously cross-checks the behavioral biometrics patterns during every session against learned user patterns and learned fraud patterns to make sure that the activity happening is not fraudulent. In this way, companies can distinguish true users from fraudsters.
The system does this in real-time and all without impacting the online experience for the user.
Moreover, ReTrust combines all of its technology and scores each session between 0 and 1000, with 0 being a true user and 1000 being a fraudster. All sessions are scored, and you decide which risk decide your threshold for when something is a risk, and what you want you want to set and what you want the consequences to be, if ReTrust detects attempted fraud. And it is up to you when you want us to alarm you. This makes the ReTrust service flexible to your needs.