TypingDNA ActiveLock is a cutting-edge continuous authentication solution designed to enhance computer security by analyzing typing patterns. Unlike traditional authentication methods that only verify identity at login, ActiveLock continuously ensures that the right person is using the device. If an unauthorized user is detected, the system automatically locks the screen, preventing access and protecting sensitive data.
What’s New in ActiveLock 3.5 “Fortress”?
The latest version of ActiveLock, 3.5 “Fortress”, is modeled after a medieval fortress, incorporating multiple layers of defense to keep unauthorized users out. With significant improvements in speed, accuracy, and multi-layered security, it stands as one of the most advanced solutions for continuous authentication. Here’s what’s new:
1. Faster and More Responsive Detection
ActiveLock 3.5 detects unauthorized access in just 50 to 100 keystrokes, compared to the previous 150 to 200 keystrokes. This means faster reactions, reducing the chances of unauthorized users interacting with the system before being locked out.
2. Multi-Modal Authentication with Face Recognition
For added security, ActiveLock 3.5 now integrates face recognition as an additional verification step. If the system detects suspicious activity, it may run a face verification before locking the device. This multi-modal approach ensures stronger protection while reducing false alarms. Additionally, when typing data is insufficient, ActiveLock also analyzes mouse behavior as part of its authentication process, further enhancing security even when users are not actively typing.
3. Instant Lock Actions for Maximum Protection
When ActiveLock detects an unauthorized user, it immediately triggers a lock action, depending on the selected security settings. This proactive approach ensures that unauthorized access attempts are halted in real-time.
4. Enhanced Security Settings for Different Use Cases
ActiveLock 3.5 offers three levels of security, each optimized for different environments:
- More Secure:
- Locks instantly upon detecting suspicious unauthorized access.
- If step-up authentication (face recognition) is unavailable, the lock action is enforced immediately.
- Best suited for high-risk environments and sensitive data protection.
- Balanced (Recommended):
- Uses an additional verification step before locking, such as face recognition. If step-up authentication is not available, it requires an additional failed typing authentication or mouse verification before issuing a lock, ensuring both security and user convenience.
- Optimized for corporate environments, ensuring high security with minimal disruption.
- Less Restrictive:
- Relies primarily on deeper typing verification without face recognition, utilizing the legacy system that requires 150-200 characters to confirm unauthorized access before triggering a lock action.
- Ideal for situations where limited time unauthorized access isn’t a critical risk.
5. Enhanced Logging
ActiveLock logs all authentication events, supporting Datadog, Splunk, Grafana+Loki, giving security teams full visibility into system access. No biometric data is stored or sent to the cloud—only metadata related to authentication attempts, app behavior and user statistics is logged for monitoring purposes.
6. Offline authentication
ActiveLock operates fully offline, with all AI and authentication processes running directly on the device, whether on Windows or Mac, without needing an internet connection. This ensures security and privacy while enabling continuous protection without relying on external servers.
Why Upgrade to TypingDNA ActiveLock 3.5?
- Twice as fast detection – flags unauthorized access in under 100 keystrokes.
- Multi-modal authentication – integrates face recognition for added security.
- Instant lock action – instantly prevents unauthorized users from accessing company data.
- Enterprise-ready – seamless logging and monitoring with top security tools.
- Non-disruptive experience – runs in the background without interfering with workflow.
ActiveLock 3.5 is a game-changer for organizations looking to strengthen endpoint security while maintaining a smooth user experience.
Contact us to request a quote or get a trial license.
We are also seeking OEM and distribution partners to expand the reach of this next-gen security solution.