Continuous Authentication

Typing Biometrics

Cursor Movement Biometrics

Device Fingerprinting

Prevent account takeover frauds on desktop, web, and mobile.
Ensure Zero Trust workforce authentication and privileged access management.
Prevent unauthorized account and device sharing.

cloud

Workforce Authentication

Advanced AI analyzes user behavior and identifies potential scams

ux

Web User Authentication

Enhances security
without compromising the user experience

timer

Silent 2FA

Approve logins and transactions invisibly and prevent website spoofing or mirror phishing fraud

Graboxy Continuous Authentication is part of the Graboxy AI Cybersecurity Platform.

Learn more about the other features such as
Remote Desktop Detection, Silent 2FA, Device Fingerprinting, and CAPTCHA & Bot Detection.

The National Cyber Awards
The Financial Services 2024

The National Cyber Awards

Multi-Award-winning cybersecurity platform
built on cutting-edge movement analysis AI by Cursor Insight

Winner of SigWiComp by the German Research Center for AI

Remote Monitoring Security Solution of the Year

Winner of the Mouse Dynamics Challenge Competition of Balabit

BOLD Awards 2024
Boldest Cybersecurity

Full-Scale Continuous Authentication for Complete User Account Protection

Graboxy offers robust protection against unauthorized access by integrating three different modules.

Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in real-time, creating unique biometric profiles based on these behaviors.

Device Fingerprinting: To identify and validate devices.

These modules can operate independently or be combined with existing security systems.

Graboxy evaluates user behavior against biometric profiles. If a user's Identity Score drops below a set threshold, it flags the session as suspicious and issues an "Unauthorized User" alert. Suspicious user sessions can be locked out or require additional multi-factor authentication to regain access.

Case Study

Continuous Online User Authentication in Banking

Goal: Decrease the number of fraudulent online banking transactions and reduce the cost of transaction authorization

Cost saving on
OTPs via SMS:

-85%

Fraud detection accuracy*:

97%

* Where sufficient training data was available.

Authenticated user sessions daily:

100K+

Learn more

How Our Biometric Authentication System Works

Step 1

We use our open-source JavaScript to gather the user's cursor movement and typing data, as well as other metadata, to create a comprehensive biometric profile.

Step 2

The anonymized data is securely sent to our servers, where we analyze the dynamic characteristics of cursor movements and typing patterns.

Step 3

Once enough data is collected, our deep-tech adaptive algorithms build unique biometric profiles.

Step 4

The system compares the user's real-time behavior patterns with their biometric profile and determines an Identity Score, updated several times a minute.

Step 5

When a user's Identity Score drops below the threshold, Graboxy flags the session as suspicious, and an "Unauthorized User" alert is sent out.

Step 6

Flagged users can be locked out or re-verified using different multi-factor authentication methods.

How Device Fingerprinting Works

Device fingerprinting is used to identify and track devices based on their unique characteristics. Unlike traditional methods like cookies, which can be deleted or blocked by users, device fingerprinting gathers a variety of data points from the device and its environment, creating a unique "fingerprint" that is hard to alter.

behavior

Behavioral Patterns

Patterns of user behavior, such as session duration, and interaction with the service

geolocation

Geolocation

The physical location of the device based on its IP address or GPS coordinates

network

Network Information

Data related to the device's IP address, network type, and connection speed

hardware

Hardware Configuration

Information about the device's hardware components, such as its processor, graphics card, and memory

user

User Agent

Information sent by the device's browser or application, which includes details like the device's user agent string, screen resolution, and language settings

software

Software Settings

Details about the device's operating system, browser version, installed plugins or extensions, and other software configurations

Did You Know?

coins

The average loss of an account takeover fraud is around $12,000 per case.

chart

36% of businesses have experienced a security incident caused by the actions of remote workers.

graph

In the most recent annual report, there has been a rise of over 230% in remote access scams compared to the prior year.

Our Blog

Featured

Gait Dynamics & Body Dimension Report Accepted as Evidence by an EU Court

This week, two leading outlets covered a breakthrough for Cursor Insight and for the broader digital forensics community. Forensic Focus published a new interview with our CEO, Tamás Zelczer, on what makes AI-driven forensic technology truly usable in practice. And Biometric Update reported that our computer vision-based gait dynamics + body-structure analysis methodology has been […]

Featured

How Accurate Is Walking Recognition? Uncovering the Precision of Our Technology

What we learned from over 90 bodies in motion, thousands of gait cycles, and near-perfect recognition rates At Cursor Insight, we’re passionate about understanding how people move—because movement, it turns out, is one of the most personal things about us. Your gait, the way you walk, is as unique as your fingerprint. And just like […]

Featured

Feature screening for ultra-high dimensional, multi-class data

Predictive modelling has become a widely used technique for businesses to gain insights from their data. It is often the case that tens (or even hundreds) of thousands of features are present in the data in question, which can be problematic when training a machine learning model. Feature screening is the process of selecting a small subset of […]

Contact Us

Book a Meeting

Let us know how we can help.
Book a free consultation now!

Book Now