Find Us

Address
123 Main Street
New York, NY 10001

Hours
Monday—Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM

Categories

Blog

TypingDNA and Ping Identity PingOne DaVinci - 2FA without phone
InPress Release

TypingDNA Now Integrates with Ping Identity’s PingOne DaVinci to Enable 2FA without a Phone, Authenticating Users with Typing Patterns

[New York/4th December 2024] — TypingDNA, announced a new integration with Ping Identity, a leader in securing digital identities for the world’s largest enterprises, leveraging PingOne DaVinciâ„¢, a no-code identity orchestration service. The DaVinci Connector will enable organizations to rely on TypingDNA Verify 2FA instead of phone-based methods, whenever 2FA/MFA is required and a phone…
InPress Release

TypingDNA has been recognized as a Sample Vendor in the Gartner® Hype Cycle™ for Digital Identity, 2024 and Gartner® Hype Cycle™ for Financial Crime, 2024

Gartner, a global market research firm, recognized TypingDNA as a Sample Vendor for the Passive Behavioral Biometrics category in two of the 2024 Hype Cycle reports: Gartner® Hype Cycleâ„¢ for Digital Identity, 2024 Gartner® Hype Cycleâ„¢ for Financial Crime, 2024 “We think this recognition holds significant value not only for TypingDNA but also for the…
TypingDNA and Cursor Insight
InPartnerships

TypingDNA and Cursor Insight Announce Strategic Alliance

[New York, USA and London, UK] — TypingDNA, a leader in typing biometrics technology, and Cursor Insight, a pioneer cursor motion-based behavior analytics, are excited to announce a new strategic alliance. This collaboration aims to explore innovative solutions and enhance technological advancements in the field of user behavior analysis. A Vision for the Future Through…
frost-feature-image
InUncategorized

TypingDNA named leader in Frost & Sullivan’s 2023 Radar Report

Frost & Sullivan, a global market research firm named TypingDNA a Leader in the 2023 Global Biometric Verification Solutions research report.  The report identifies companies that show significant growth and innovation within the biometric verification market — marking a significant step for typing biometrics as a verification method alongside popular vendors. “Behavioral biometrics remains one…
How to prevent common types of social engineering attacks with behavioral biometrics
InBehavioral BiometricsCustomer AuthenticationRemote Workforce Authentication

How to prevent common types of social engineering attacks with behavioral biometrics

Enterprises can protect their sensitive information, customers, and employees from common types of social engineering attacks using behavioral biometrics for 2FA and continuous authentication. Behavioral biometrics verifies the identity of customers and business teams, preventing unauthorized users’ access to accounts and devices. In this article, we’ll look into social engineering attacks and how they work…
How to handle MFA for employees without using personal phones
InMFARemote Workforce AuthenticationZero Trust

Workforce MFA that doesn’t require personal phones

To achieve security, enterprises work with IAM systems that deploy multi-factor authentication (MFA). Mfa allows businesses to verify their employees’ identities when they login to corporate apps. While MFA is key to security, companies should avoid using methods that require employees to use their phones. Below, we focus on why phone-based MFA is burdensome and…
Department of Defense Zero Trust Model and How To Comply With It
InActiveLock Continuous Endpoint Authentication (CEA)Compliance RegulationsZero Trust

What is the Department of Defense Zero Trust strategy 2022, and how to comply with it?

The US Department of Defense Zero Trust strategy means increased security across all government bodies by giving no inherent trust to any user accessing apps, networks, or systems. The DoD Zero Trust strategy enables the transition from static, network-based security to a more dynamic collection of cybersecurity practices. Read on to find out what a…
How to secure BYOD devices with continuous endpoint authentication
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce AuthenticationZero Trust

BYOD Security: Reducing Enterprise Risk With Continuous Endpoint Authentication

BYOD stands for Bring Your Own Device and is a practice in which personal devices are used to complete work-related tasks. BYOD has both pros and cons. On the one hand, BYOD can increase productivity and lower costs for enterprises and their employees. On the flip side, allowing contractors or employees to use their personal…