GreatHorn Account Takeover Protection
Identify compromised accounts and block account takeover attempts using biometric authentication
Reduce the Risk of Compromised Accounts
GreatHorn Account Takeover Protection provides a low-friction way to identify compromised accounts that’s easy to implement, difficult to bypass, and minimally disruptive for employees.
When combined with GreatHorn Email Security, Account Takeover Protection is part of a comprehensive strategy to protect against internal threats, which also includes automatic analysis of internal email and identification of credential theft attacks.
Account Takeover Protection
Easily identify and take action on compromised accounts using biometric authentication to verify employee identities – reducing the exposure from any compromised accounts.
Credential Theft Detection
As part of GreatHorn’s link protection functionality, all suspicious links are analyzed for credential theft using computer vision, preventing employees from accessing password-stealing sites.
Internal Email Protection
GreatHorn Email Security automatically analyzes your internal email exactly the same way as external email – taking into account relationships, communication patterns, and more.
Difficult to bypass
Authentication is trustworthy and difficult to replicate as it’s based on biometric data
Initial setup and ongoing verification is as simple as typing an email address
Administrator roll-out via Outlook plugin – no additional apps to download
Failure actions can be adjusted based on risk tolerance or group – from a simple alert to send prevention
Supports mobile, desktop, and web interfaces to ensure protection regardless of access method
Compatible with other solutions
Use in conjunction with multi-factor authentication or identity access management solutions
The Enemy Within
The risk of account takeover has increased exponentially. Yet identifying compromised email accounts can be tricky – often showing up only after there’s been financial and reputation damage.
Compromised accounts provide access to sensitive applications and information. Criminals also use compromised accounts to daisy-chain their way to senior executives with greater access and authority.
A Biometric Solution to Account Takeover
Less than 10 percent of organizations have implemented multi-factor authentication across their enterprise , and it doesn’t protect you from cell-jacking, unattended and unlocked devices, or phone-based social engineering.
GreatHorn Account Takeover Protection provides a low-friction, secondary layer of authentication that’s easy to implement, difficult to bypass, and minimally disruptive for employees.
Simple, Easy Identification
– No Devices Required
Your typing pattern is automatic, always available, and unique to you. Account Takeover Protection uses machine learning techniques to capture an employee’s unique typing pattern on both desktop and mobile devices – analyzing the dynamics of an employee’s keystrokes, such as speed, pressure, and timing between key press and release. We don’t capture the keystrokes themselves.
Visibility, Control, and Early Notification
Adjust how often employees are challenged based on frequency, time delay, communication pattern anomalies and more.
You can also configure actions based on authorization failures:
- Insert a warning banner to the recipient
- Remove the message upon send
- Alert the security team, or
- Simply log the event for later analysis.
Failed attempts populate into the GreatHorn dashboard providing context for faster incident response.