Our TickStream engine recognizes people's behavior,
not account habits, linking activity to physical people: whether known or anonymous, to establish trust and identity.
Federal News Radio 1500AM
Bethann Rome, COO, appears on the What's Working in Washington radio program,
hosted by Jonathan Aberman
Hear it now
A username and password is not an identity.
TickStream.KeyID recognizes people, not just accounts. It's real behavior analytics about the person at the keyboard.
Biometrics giving you a headache?
A dose of TickStream.KeyID makes that go away.
Low-cost, and easy to deploy.
No training required.
Protecting your identity is just a start. You must own your identity.
Intensity Analytics Awarded Key Patent for Behavioral Authentication Security Software
WARRENTON, VA – September 7, 2016 - Intensity Analytics, a specialized software company with a long history of innovation in data security,
announced today that the United States Patent and Trademark Office awarded it US Patent 9,430,626 titled User Authentication Via Input of Known Text.
The newly- patented IP combines advanced mathematics and machine-learning techniques to immediately recognize users by their keyboard typing patterns,
while denying illegitimate users access, thus negating the value of wrongfully-obtained credentials.
(read the full release)
TickStream® Cybersecurity Defense Suite
Meeting the challenges to cyberthreat intelligence by recognizing the people performing the behavior.
Physical behavioral analytics for second-factor authentication, using only the keyboard. Using the cadence and habits (not characters) of the user
when entering their credentials, it is frictionless, employs no private data (PII), and requires no special hardware.
Dynamic user validation for continuous authentication, insider threat analysis, non-repudiation and authorship verification, either based on windowed streams of
activity and context, or discrete analysis for self-serve account and password management.
Automates the collection of how computers are used, by application, process, person, and machine. This metadata is mined for productivity and telework
analysis, spend management, forensics, chain-of-custody requirements, and regulatory compliance.
“One of the things musicians can do is recognize each other by the way they play,” says Bethann Rome, co-founder of Intensity Analytics. “You can hear a guitar riff and you can say—‘ah! I know who that is’.” The same way playing identical notes can sound different from one musician to the next because of personal style, new technology can spot the pacing and patterns of our typing.
Bethann was featured on What's Working in Washington, on Federal News Radio 1500AM. Listen to her appearance here: http://intensityanalytics.com/wwiw
Read the article...
When asked by MPT’s Your Money and Business Jeff Salkin if there are any special up-and-coming companies to watch in the metro region, Jonathan Aberman, recognized by Washingtonian magazine as a “Tech Titan,” by Washington Business Journal as a member of the “Power 100” and by the Commonwealth of Virginia as one of the “50 Most Influential Entrepreneurs” in the Commonwealth, shared his thoughts on a truly special emerging tech company from northern Virginia – Intensity Analytics. “It just blew my mind” said Aberman when talking about Intensity Analytics’ TickStream suite of products and their ability to make stolen credentials essentially ineffective for hackers. View the excerpt and full video here: http://intensityanalytics.com/mpt
Read the article...
It seems like every day there’s news of another significant data breach, so here’s today’s: An internal investigation by the InterContinental Hotel Group, which owns Holiday Inn, has revealed that guests at more than a thousand of their hotels had their credit card details stolen. The company identi...
As Irving Berlin wrote in Happy Holiday, "If you're burdened down with trouble, if your nerves are wearing thin, park your load down the road, and come to Holiday Inn." May we add, "If you care about your credit, and you just wanna check in, try the hotel down the road, don't come to Holiday Inn." What can you do to protect your accounts when the vendors you deal with aren't as concerned about cybersecurity? With TickStream.KeyID protecting access, hackers can't use the data they steal.
Read more: http://intensityanalytics.com
Read the article...