Graboxy
Graboxy's Continuous Authentication solution safeguards against identity fraud and account takeover attacks by continuously monitoring users' behavior and incorporating device fingerprinting. Cursor movement and typing biometrics are unique to each user and cannot be stolen or replicated. Operating invisibly in the background, Graboxy requires no interaction or extra hardware, ensuring a frictionless user experience. Graboxy works on desktop, web & mobile. Our solution collects movement data through the browser or a client installed on the device. Graboxy is FIDO compliant, and can be integrated into enterprise systems, web services, and mobile apps, thus covering a wide range of use cases for account and transaction authentication. By leveraging AI-based risk scoring, it automatically triggers multi-factor authentication or locks out unauthorized users, providing proactive defense against evolving threats. Graboxy can be used as a silent Multi-Factor Authentication to invisibly approve logins and transactions, and to prevent website spoofing and phishing fraud. Graboxy complies with GDPR data privacy regulations, and it is compliant with SOC2 and NIS2 as well.
Graboxy Introduction
What is Graboxy?
Graboxy offers robust protection against unauthorized access by integrating three different modules: Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in real-time, creating unique biometric profiles based on these behaviors. Device Fingerprinting: To identify and validateiter devices. These modules can operate independently and can be combined with existing security systems. Graboxy evaluates user behavior against biometric profiles in real time. If a user's Identity Score drops below a set threshold, it flags the session as suspicious and issues an "Unauthorized User" alert. Suspicious user sessions can be locked out or require additional multi-factor authentication to regain access. How does Graboxy work? Step 1 We use our open-source JavaScript to gather the user's cursor movement and typing data, as well as other metadata, to create a comprehensive biometric profile. Step 2 The anonymized data is securely sent to our servers, where we analyze the dynamic characteristics of cursor movements and typing patterns. Step 3 Once enough data is collected, our deep-tech adaptive algorithms build unique biometric profiles. Step 4 The system compares the user's real-time behavior patterns with their biometric profile and determines a risk score (“Identity Score”), updated several times a minute. Step 5 When a user's risk score drops below the threshold, Graboxy flags the session as suspicious, and an "Unauthorized User" alert is sent out. Step 6 Flagged users can be locked out or re-verified using different multi-factor authentication methods. Silent 2FA and Transaction Authorization Graboxy's Silent 2FA solution revolutionises transaction approval by invisibly authenticating users in the background using biometric confidence scores. With Graboxy, financial institutions and payment providers can eliminate the need for costly SMS codes or cumbersome device switching, providing a frictionless user experience while ensuring robust security measures are in place. Graboxy as Silent 2FA - Banking Use Case We conducted a pilot with a major European bank involving 1.2 million users to test Graboxy as aSilent 2FA solution. The impressive results showed a fraud detection accuracy of 97% and an 85% reduction in costs associated with one-time passwords sent by SMS. Graboxy seamlessly authenticates users in the background using biometric confidence scores, eliminating the need for cumbersome SMS codes and providing a smoother, more secure user session.
How to use Graboxy?
Visit website for more info




