Shape Technical Solution Overview
Shape Technical Solution Overview
Shape Technical Solution Overview
Network includes:
Shape protects web & mobile 3 of the top 4 US banks
6 of the top 10 Airlines
applications from automated 2 of the top 5 Hotel Chains
attack and abuse 1 of the top 3 eCommerce Retailers
2 of the top 3 US Wireless Carriers
Founded:
Mountain View, California
2011
Patents:
50+ Issued
130+ Pending
Confidential Confidential /
Fraud occurs when Criminals act like Legitimate Users
❏ Credential
? Stuffing
❏ Credit Card
Stuffing
❏ Account
?
Takeover
Criminals
Users Web & Mobile Apps
(not evident until it’s too late)
(criminals mixed in with good users) (serve good users & criminals alike)
Confidential /
Cost vs Value in Attack
Confidential /
User Fingerprint (UFP)
Pseudo-unique fingerprints derived from user interaction
Orange Key-up.
Bar
U1
Red Mouse-click.
Circle
Grey
Line
Transition from non-
mouse event to mouse
U3
event.
Mouse events & Mouse click
Confidential /
User Fingerprint (UFP)
Visualization of fingerprints generated using Selenium
Orange Key-up.
Bar
U1
Red Mouse-click.
Circle
Grey
Line
Transition from non-
mouse event to mouse
U3
event.
Confidential /
Typing Deviation Score
Customers type their passwords differently than fraudsters
3.6 seconds
Confidential /
Browser Fingerprint (BFP)
Pseudo-unique fingerprint derived from hundreds of browser signals
Additional
Plugins Signals
Confidential /
Header Fingerprint (HFP)
Pseudo-unique fingerprint derived from HTTP header information
Confidential /
Multi-Stage Protection
11
Confidential /
Multi-stage detection is paramount
Shape provides multi-stage detection as a service
appliance
MACHINE LEARNING
ARTIFICIAL INTELLIGENCE
24x7
STAGE I STAGE II
Good Traffic
Bad Traffic
Confidential /
Multi-stage defense enables long term efficacy
Actual Shape customer’s journey to less than 1% automation
2017
78% Automated
2018
<1
Automated
%
Confidential /
Thank You