SOURCE: Watchful Software

Watchful Software

March 26, 2013 08:30 ET

Watchful Software Releases TypeWATCH 1.2 for Advanced Persistent Security

Advanced e-Biometrics Technology Provides Constant Authentication of Users as They Work on Critical Systems Without Specialized Hardware Required

MEDFORD, NJ and LISBON, PORTUGAL--(Marketwire - Mar 26, 2013) - Watchful Software, a leading provider of data-centric information security solutions, announced today the release of TypeWATCH Version 1.2, an e-Biometrics solution that leverages the science of Keystroke Dynamics to identify and authenticate users simply by the way they interact with their system. TypeWATCH provides persistent post-authentication security for critical systems and, if an intruder is detected, it automatically applies the security policies defined by the organization, retaining an auditable record for compliance purposes.

Biometric systems are rapidly gaining acceptance as cybercrimes have proven that old authentication methods (such as User ID/Password combinations and tokens) have become too easily defeated (theft, sniffing, hacking, etc.). However, most biometric systems involve complex, expensive hardware components, which can make the systems financially and logistically impractical.

TypeWATCH recognizes a person by the way he/she types on a keyboard, regardless of what the text input might be, as they continue to interact with a system. As opposed to standard authentication techniques (such as passwords or tokens) that validate only on sign-on, the e-Biometric technology continually analyzes input to persistently ensure that the users are who they claim to be, ensuring protection against stolen/copied/hacked passwords or even malware bots. In the event of a potential system breach, TypeWATCH deploys and automatically applies predefined security policies (challenge passwords, notification, lockout, etc.), if an intruder is detected.

TypeWATCH also provides a forensic audit trail tool, for compliance purposes, to use in the event of suspected unauthorized access attempt. As it is a software-only solution -- with no biometric hardware requirements, such as expensive and complex biometric readers -- it is simple to deploy and easy to maintain and, at the same time, is designed to run transparently to the user. The system employs continuous learning algorithms to offset for fatigue, switching or sharing of computers/keyboards and mood, and avoids standard privacy concerns since it does not register or log actual text or content being typed.

"For decades, we have relied on a simple 'two-pronged key' to allow us into virtually any computer system on the planet: the veritable userID/password combination. In today's world, it has been proven time and again that this same basic authentication structure is an insufficient barrier to entry to most systems, from home banking, to gaming, to mission critical infrastructure. However, by and large we haven't progressed past that old 'two pronged key' approach to opening even the most important systems," states Rui Melo Biscaia, Watchful Software's Product Development Director. "TypeWATCH delivers a persistent personal proof of identity in real time -- not just one-time authentication of a password -- providing strong protection against the most common fraud attempts."

About Watchful Software
Watchful Software was formed in 2012 to address the requirement to protect an organization's most critical asset after its people -- its information. The company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful Software has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems or can handle sensitive information, thereby protecting against the massive economic and competitive damage often done by cyberterrorists and information thieves.

Contact Information

  • For more information, please contact:
    Rui Melo Biscaia
    Watchful Software
    Email Contact

    Joanne Hogue
    Smart Connections PR
    +1 (410) 658-8246
    Email Contact