Telesign impermium webinar deck-121312
Post on 13-May-2015
145 Views
Preview:
DESCRIPTION
Transcript
TeleSignIn Partnership with Impermium
Presents:
Live Webinar:Stop Social Spam
WHAT WE DO ‣ Two-Factor Authentication‣ Phone-based Verification
(SMS/ Voice)‣ Intelligent Data (Phone type,
Device status, etc.
ABOUT US: TeleSign is the global leader in Intelligent Authentication providing actionable data to secure online transactions, reduce fraud, and improve the end-user experience.
Forrest HobbsVice President TeleSign
ABOUT US: Impermium provides robust security for web sites and social networks, leveraging user reputation to defend against social spam, account compromise, transaction fraud, and abuse.
WHAT WE DO ‣ Real-time threat analysis‣ Behavioral anomaly detection‣ Social user reputation‣ Malicious content protection
Mark RisherCEOImpermium
Dear Sir or Madam:
I bid you to happiness to yourself
and to your own family in this day.
It is my ESTEEMED PLEASURE to be
presenting to you the sum total of
$1.000,40,000 UNITED STATES DOLLARS
(USD) from His Royal High Holiness,
the Esteemed Minister of Treasury
for the Oil Ministry of our country…
5
2005 2006 2007 2008 2009 2010 2011
Social Media has Eclipsed Email(for good users and bad)
Social media
Agenda
6
Anatomy of the Attacks
Risks and Impact
Three-Step Approach to Mitigation
Wherever the Eyeballs Are
7
Blog posts
Chat Messages
Reviews & listings
Discussion forum threads
Message board posts
Direct Messages
Comments
URL & link submissions
Fraudulent user signups
Varieties of Social Spam
8
Malicious Content
Policy Abuse
Commercial Content
Malware Placement Aids Propagation
9
Novel Sites & Links are Commonplace
10
Acct. Compromise: Reputation Hijacking
11
Acct. Compromise: Reputation Hijacking
12
Social much more “viral” than email
250:113
Fraudsters Walk in the Front Door
14
Bulk Accounts on the Open Market
15
Malicious Content Repels Good Users
16
$#*!&!
Icons copyright © http://deleket.deviantart.com
• Engagement• Loyalty• Pageviews• Brand Reputation
Indirect Effects Compounded
17
Lost Advertising Revenue
PageRank and SEO
Manual Review Costs
Unreliable Site Metrics
3-Step Approach
Block Bogus Accounts
Stop Spam & Malicious Content
Prevent Account Hijacking
Block Bogus Accounts
Telephone Verification
RegistrationCapture phone number
AnalysisPhone TypeDevice/Subs StatusPast behavior
Accept
Deny
Flag
Phone VerifyEnsure phone number is valid & reachable
Account Creation
Reject Registration
Certain phone types are more likely to be associated with online fraud and considered higher risk.
Importance of Phone Type
TeleSign Verify is a quick and simple way to prevent online fraud and social spam by identifying legitimate users using their phone
User enters phone number on website and clicks “submit”
User receives verification code on cell phone or landline
User logs in by entering the verification code onto the website
How Verification Works
Stop Spam & Malicious Content
• Active Moderation• Trained staff reviews/approves content• Scale & consistency challenges
• Community Feedback• Cost-effective• Punishes most loyal users• Trailing indicator
• Invitation-Only• Reduces engagement• Anti-Social
• Individual Banning• Whack-a-mole
22
Stop Spam & Malicious Content
Content analysis
23
Behavioral anomaly detection
Continuous user reputation
Stop Spam & Malicious Content
‣ Bullying, insults and threats
‣ Suspicious signups‣ Repeat offenders‣ Malicious content‣ Signs of account
compromise
‣ High-risk phone type‣ Name/address tied to
account‣ Device or subscriber
status‣ Phone risk score
Use these in conjunction to keep your house clean:
Phone Verify User
Allow
Flag
Deny
Activity Phone Signals
Stop Spam & Malicious Content
Impermium Human Moderation
Time to process 19 seconds 2-3 days
Accuracy 99.5% 95%
False Positives 4 79
10,000 Comments
Protect legitimate account owners from account takeover with two-factor authentication in the following scenarios:
Prevent Account Hijacking
Key changes to account information
Unrecognized device or IP address
Unusual activity
Telephone Verification
Risk-Based Authentication Two-factor auth. Account changes Password resets
Accept Change
Reject Change
Phone VerifyUse 2FA to ensure that account changes are legitimate
Prevent Account Hijacking
SPECIAL REPORT Complete our post-webinar survey and we’ll send you a copy of our report.
SPECIAL OFFER:Sign up by 12/31/12 and get 50% off your first THREE MONTHS of service.*
Special Webinar Offers
* Limitations apply.
TAKE 50% OFFyour first 3 months of services
Thank you.
Have questions?
Email us at
learnmore@telesign.com
top related