GreatHorn Account Takeover Protection

Identify compromised accounts and block account takeover attempts using biometric authentication

Reduce the Risk of Compromised Accounts

GreatHorn Account Takeover Protection provides a low-friction way to identify compromised accounts that’s easy to implement, difficult to bypass, and minimally disruptive for employees.

When combined with GreatHorn Email Security, Account Takeover Protection is part of a comprehensive strategy to protect against internal threats, which also includes automatic analysis of internal email and identification of credential theft attacks.

Account Takeover Protection

Easily identify and take action on compromised accounts using biometric authentication to verify employee identities – reducing the exposure from any compromised accounts.

Credential Theft Detection

As part of GreatHorn’s link protection functionality, all suspicious links are analyzed for credential theft using computer vision, preventing employees from accessing password-stealing sites.

Internal Email Protection

GreatHorn Email Security automatically analyzes your internal email exactly the same way as external email – taking into account relationships, communication patterns, and more.

Most solutions claiming to provide account takeover protection use behavioral cues to try to identify account takeover – but can’t actually verify the sender’s identity.

GreatHorn actually validates the identity of a sender using biometric authentication.

Key Benefits

Difficult to bypass

Authentication is trustworthy and difficult to replicate as it’s based on biometric data

Minimally disruptive

Initial setup and ongoing verification is as simple as typing an email address

Simple implementation

Administrator roll-out via Outlook plugin – no additional apps to download

Configurable actions

Failure actions can be adjusted based on risk tolerance or group – from a simple alert to send prevention

Mobile-friendly

Supports mobile, desktop, and web interfaces to ensure protection regardless of access method

Compatible with other solutions

Use in conjunction with multi-factor authentication or identity access management solutions

Compromised Accounts:
The Enemy Within

The risk of account takeover has increased exponentially. Yet identifying compromised email accounts can be tricky – often showing up only after there’s been financial and reputation damage.

Compromised accounts provide access to sensitive applications and information. Criminals also use compromised accounts to daisy-chain their way to senior executives with greater access and authority.

A Biometric Solution to Account Takeover

Less than 10 percent of organizations have implemented multi-factor authentication across their enterprise , and it doesn’t protect you from cell-jacking, unattended and unlocked devices, or phone-based social engineering.

GreatHorn Account Takeover Protection provides a low-friction, secondary layer of authentication that’s easy to implement, difficult to bypass, and minimally disruptive for employees.

Simple, Easy Identification
– No Devices Required

Your typing pattern is automatic, always available, and unique to you. Account Takeover Protection uses machine learning techniques to capture an employee’s unique typing pattern on both desktop and mobile devices – analyzing the dynamics of an employee’s keystrokes, such as speed, pressure, and timing between key press and release. We don’t capture the keystrokes themselves.

Visibility, Control, and Early Notification

Adjust how often employees are challenged based on frequency, time delay, communication pattern anomalies and more.

You can also configure actions based on authorization failures:

  • Insert a warning banner to the recipient
  • Remove the message upon send
  • Alert the security team, or
  • Simply log the event for later analysis.

Failed attempts populate into the GreatHorn dashboard providing context for faster incident response.