Continuous Authentication
Typing Biometrics
Cursor Movement Biometrics
Device Fingerprinting
Prevent account takeover frauds on desktop, web, and mobile.
Ensure Zero Trust workforce authentication and privileged access management.
Prevent unauthorized account and device sharing.

Workforce Authentication
Advanced AI analyzes user behavior and identifies potential scams

Web User Authentication
Enhances security
without compromising the user experience

Silent 2FA
Approve logins and transactions invisibly and prevent website spoofing or mirror phishing fraud
Graboxy Continuous Authentication is part of the Graboxy AI Cybersecurity Platform.
Learn more about the other features such as
Remote Desktop Detection, Silent 2FA, Device Fingerprinting, and CAPTCHA & Bot Detection.
The National Cyber Awards
The Financial Services 2024

Multi-Award-winning cybersecurity platform
built on cutting-edge movement analysis AI by Cursor Insight
Full-Scale Continuous Authentication for Complete User Account Protection
Graboxy offers robust protection against unauthorized access by integrating three different modules.
Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in real-time, creating unique biometric profiles based on these behaviors.
Device Fingerprinting: To identify and validate devices.
These modules can operate independently or be combined with existing security systems.
Graboxy evaluates user behavior against biometric profiles. If a user's Identity Score drops below a set threshold, it flags the session as suspicious and issues an "Unauthorized User" alert. Suspicious user sessions can be locked out or require additional multi-factor authentication to regain access.
Case Study
Continuous Online User Authentication in Banking
Goal: Decrease the number of fraudulent online banking transactions and reduce the cost of transaction authorization
Cost saving on
OTPs via SMS:
-85%
Fraud detection accuracy*:
97%
* Where sufficient training data was available.Authenticated user sessions daily:
100K+
How Our Biometric Authentication System Works
Step 1
We use our open-source JavaScript to gather the user's cursor movement and typing data, as well as other metadata, to create a comprehensive biometric profile.
Step 2
The anonymized data is securely sent to our servers, where we analyze the dynamic characteristics of cursor movements and typing patterns.
Step 3
Once enough data is collected, our deep-tech adaptive algorithms build unique biometric profiles.
Step 4
The system compares the user's real-time behavior patterns with their biometric profile and determines an Identity Score, updated several times a minute.
Step 5
When a user's Identity Score drops below the threshold, Graboxy flags the session as suspicious, and an "Unauthorized User" alert is sent out.
Step 6
Flagged users can be locked out or re-verified using different multi-factor authentication methods.
How Device Fingerprinting Works
Device fingerprinting is used to identify and track devices based on their unique characteristics. Unlike traditional methods like cookies, which can be deleted or blocked by users, device fingerprinting gathers a variety of data points from the device and its environment, creating a unique "fingerprint" that is hard to alter.

Behavioral Patterns
Patterns of user behavior, such as session duration, and interaction with the service

Geolocation
The physical location of the device based on its IP address or GPS coordinates

Network Information
Data related to the device's IP address, network type, and connection speed

Hardware Configuration
Information about the device's hardware components, such as its processor, graphics card, and memory

User Agent
Information sent by the device's browser or application, which includes details like the device's user agent string, screen resolution, and language settings

Software Settings
Details about the device's operating system, browser version, installed plugins or extensions, and other software configurations
Did You Know?
The average loss of an account takeover fraud is around $12,000 per case.
36% of businesses have experienced a security incident caused by the actions of remote workers.
In the most recent annual report, there has been a rise of over 230% in remote access scams compared to the prior year.









