{"id":1582,"date":"2009-05-07T00:00:00","date_gmt":"2009-05-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/05\/07\/startup-takes-new-spin-on-online-fraud-detection\/"},"modified":"2021-12-30T11:39:39","modified_gmt":"2021-12-30T11:39:39","slug":"startup-takes-new-spin-on-online-fraud-detection","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/05\/07\/startup-takes-new-spin-on-online-fraud-detection\/","title":{"rendered":"Startup Takes New Spin On Online Fraud Detection"},"content":{"rendered":"<p>A security startup is preparing to emerge from stealth mode with a new technology that detects in real-time whether an online user or member of a social network is legitimate &#8212; and not a bot, automated tool, or criminal performing financial or other online fraud.  Pramana, which will officially launch in July, has developed what it calls HumanPresent, a technology spun off from research at Georgia Tech that catches online fraud in action, real-time, using a dynamic method of identifying human behavior anomalies while at the same time preventing the fraudsters from detecting that they&#8217;re being watched.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We deploy different collection mechanism strategies on different pages to evade detection, as well as evolve our system with new strategies,&#8221; says Sanjay Sehgal, CEO of Pramana, who is keeping the details of the inner workings of HumanPresent close to the vest so as not to tip off the bad guys.  &#8220;We are in the abuse and fraud detection and prevention part of the security space, not network security,&#8221; he says.<\/p>\n<p>In addition, Pramana&#8217;s technology doesn&#8217;t use device fingerprinting to identify a bot or rogue activity like other online fraud firms, such as Iovation and 41st Parameter.<\/p>\n<p>Pramana offers both a Linux-based virtual appliance that handles the fraud detection on-site or a software-as-a-service model.<\/p>\n<p>Among Pramana&#8217;s customers so far are financial services firms, social networking sites, online gaming sites, and Webmail sites.<\/p>\n<p>Pricing for the HumanPresent SaaS ranges from 50 cents to $2 per user or per transaction; the company has not yet determined pricing for its appliance, which is based on a hardened version of Linux.<\/p>\n<p>http:\/\/www.darkreading.com\/securityservices\/security\/attacks\/showArticle.jhtml;jsessionid=DREA5TXWFFJSYQSNDLRSKH0CJUNN2JVN?articleID=217300733<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1582","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1582"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1582\/revisions"}],"predecessor-version":[{"id":4069,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1582\/revisions\/4069"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}