Silent 2FA

Approve logins & transactions invisibly and
prevent website spoofing or mirror phishing fraud

cloud

AI-Driven
Scam Detection

Utilizes advanced algorithms to analyze user behavior and identify potential scams

defend

Cannot be stolen
or replicated

Biometric profiles created from human movement cannot be stolen or replicated

gdpr

Compliant with NIS2,
PSD2, and SCA

Graboxy is compliant with NIS2, PSD2, SCA and offers OAuth2 integration.

Graboxy Silent 2FA is part of the Graboxy AI Cybersecurity Platform.

Learn more about the other features such as
Remote Desktop Detection, Continuous Authentication, Device Fingerprinting, CAPTCHA & Bot Detection, and Chrome Extension.

The National Cyber Awards
The Financial Services 2024

The National Cyber Awards

Multi-Award-winning cybersecurity platform
built on cutting-edge movement analysis AI by Cursor Insight

Winner of SigWiComp by the German Research Center for AI

Remote Monitoring Security Solution of the Year

Winner of the Mouse Dynamics Challenge Competition of Balabit

BOLD Awards 2024
Boldest Cybersecurity

Case Study

Continuous Online User Authentication in Banking

Goal: Decrease the number of fraudulent online banking transactions and reduce the cost of transaction authorization

Cost saving on
OTPs via SMS:

-85%

Fraud detection accuracy*:

97%

* Where sufficient training data was available.

Authenticated user sessions daily:

100K+

Learn more

How It Works

Step 1

We use our open-source JavaScript to gather the user's cursor movement and typing data, as well as other metadata, to create a comprehensive biometric profile.

Step 2

The anonymized data is securely sent to our servers, where we analyze the dynamic characteristics of cursor movements and typing patterns.

Step 3

Once enough data is collected, our deep-tech adaptive algorithms build unique biometric profiles.

Step 4

The system compares the user's real-time behavior patterns with their biometric profile and determines an Identity Score, updated several times a minute.

Step 5

When a user's Identity Score drops below the threshold, Graboxy flags the session as suspicious, and an "Unauthorized User" alert is sent out.

Step 6

Flagged users can be locked out or re-verified using different multi-factor authentication methods.

Did You Know?

coins

The average loss of an account takeover fraud is around $12,000 per case.

chart

36% of businesses have experienced a security incident caused by the actions of remote workers.

graph

In the most recent annual report, there has been a rise of over 230% in remote access scams compared to the prior year.

Our Blog

Featured

Gait Dynamics & Body Dimension Report Accepted as Evidence by an EU Court

This week, two leading outlets covered a breakthrough for Cursor Insight and for the broader digital forensics community. Forensic Focus published a new interview with our CEO, Tamás Zelczer, on what makes AI-driven forensic technology truly usable in practice. And Biometric Update reported that our computer vision-based gait dynamics + body-structure analysis methodology has been […]

Featured

How Accurate Is Walking Recognition? Uncovering the Precision of Our Technology

What we learned from over 90 bodies in motion, thousands of gait cycles, and near-perfect recognition rates At Cursor Insight, we’re passionate about understanding how people move—because movement, it turns out, is one of the most personal things about us. Your gait, the way you walk, is as unique as your fingerprint. And just like […]

Featured

Feature screening for ultra-high dimensional, multi-class data

Predictive modelling has become a widely used technique for businesses to gain insights from their data. It is often the case that tens (or even hundreds) of thousands of features are present in the data in question, which can be problematic when training a machine learning model. Feature screening is the process of selecting a small subset of […]

Contact Us

Book a Meeting

Let us know how we can help.
Book a free consultation now!

Book Now