InAuth specialises in mobile and browser authentication and fraud / malware detection for Financial Services and Online Retailers. Amongst it's products are Dynamic and Persistent ID, deep location lookup, malware and crimeware detection, root detection and fuzzy device fingerprinting.
2. InAuth, Inc.
2
InAuth Corporate Overview
InAuth has deep roots in the mobile space, as well as strong Financial Services, Risk, Fraud, and
Device Identification and Intelligence coverage. We are a privately-held software company, full of
engineers and developers backed by very successful former bankers and entrepreneurs. Our sole
focus is security for financial services and alternative payment providers.
InAuth meets and exceeds authentication and layered security guidelines set forth by
regulators/agencies including the Federal Financial Institutions Examination Council (FFIEC).
InAuth delivers a user-friendly secure transaction environment to the financial services and mobile
transaction markets with our suite of PC/mobile browser fingerprinting/fraud detection and mobile
security modules (SDK’s) that are integrated with the downloadable mobile applications and work
with our Risk Engine and Case Management System within our Security Platform.
The InAuth system may snap into the existing systems or risk management tools (such as RSA,
Actimize or others) both seamlessly and transparently.
3. Trends
o Security breaches via malware
and bots are more frequent,
bigger and national news -
Target, Neimans, etc.
o Consumers have and are
continuing to shift toward
mobile devices and mobile apps
o Mobile can be the weakest link,
presenting substantial exposure
to fraud.
3
The Problem
• Mobile devices subvert controls
that are relied on in the browser-
based online world, namely IP
address…which does not yield
results in mobile apps.
• Mobile malware via phishing and
SMSishing is proliferating and
difficult to spot due to screen size
& limited info. Open platforms
such as Android are particularly
vulnerable.
• New capabilities due to customer
demand, remote deposit capture
& mobile payments bring new
attack vectors. As more risky
transactions are enabled, better
mobile centric security is critical.
4. Value Proposition
4
Increased Revenue - approve more transactions with high degree of
confidence
Enhanced Decisioning - increased visibility to the device provides for richer
data for better risk decisions
Increased Security Measures – providing more granular device details,
(browser or mobile) not available with other solutions, will help to determine
the identity and assist in determining the riskiness of the transaction
Brand Protection – no disruption to the customer experience - reducing the
challenge rate and creating a stronger customer relationship
MinimizeOperating costs – reduce rejects and outsorts enables for
investigation on only the riskiest transactions
5. Benefits
5
True Mobile Identity Data (Persistent Identifier)
Unprecedented visibility to device data
Trusted (cross-checked) location data
Accelerate time to detection with more precise data points
PIN & Reputation Protection (Advanced Root & Crimeware Detect)
Ability to write more & better rules (more data delivered)
Lower collision rates (more accurate browser print)