Blog
FAQs – How do we ensure customers’ privacy?
Companies must ensure customers’ privacy, at all costs. We value the privacy of our users the most, for any information, feel free to contact us.Behavioral biometrics: signature analysis | cognitive biometrics
TypingDNA presents the various types of biometrics and explores their use for authentication and beyond.4 takeaways from How to Web conference
Defining a north star metric, keeping things simple and making data-driven decisions are some of TypingDNA’s takeaways from How to Web conference.TypingDNA mentioned in Gartner’s Magic Quadrant for Access Management as a partner to Optimal IdM
TypingDNA is mentioned in Gartner’s Magic Quadrant for Access Management* as a partner to Optimal IdM.Behavioral biometrics: gait analysis – voice ID
In this series, we present various types of biometrics and explore their use for authentication. In our latest blog post, we spoke about mouse use characteristics and analyzed their use cases.PSD2: The new 3D Secure 2.0Â
The 3D Secure security protocol is one of the key changes deriving from PSD2 and the SCA(Strong Customer Authentication) amendments.FAQs – If your typing pattern changes, can you still be authenticated?
We recommend at least one additional security factor to be put in place, so in case your typing pattern changes, you will still be able to log in.InActiveLock Continuous Endpoint Authentication (CEA)AIBehavioral BiometricsBuilt with TypingDNAFAQs SeriesTyping Biometrics