TypingDNA has been recognized as a Sample Vendor in Gartner® Hype Cycle™ for Digital Identity, 2024 and Gartner® Hype Cycle™ for Financial Crime, 2024. Learn more

Glossary

Learn the terms & definitions being used in today’s ever-changing cybersecurity landscape.

Attack Surface Area
Imagine the Attack Surface Area as a universe that consists of all the doors to an organization’s systems, including any software and hardware components which can be used as an entry point. The more entry points, the higher the risk of unauthorized users accessing and damaging the network.
Behavioral Biometrics
Behavioral biometrics identifies patterns in human behavior, and is one of the most secure methods of identity validation. While passwords are easily hacked, personality and behavioral patterns are far more difficult to replicate. The wide availability of keyboards makes typing biometrics one of the most accessible forms of behavioral biometrics.
Bring Your Own Device (BYOD)
BYOD, or Bring Your Own Device, refers to employees using personal devices, such as mobile phones, laptops, or desktop computers, for work-related purposes. As more people continue to work remotely, BYOD has become a convenient alternative to juggling multiple devices, despite increased cyber threats.
Continuous Endpoint Authentication (CEA)
Continuous Endpoint Authentication (CEA) ensures that only the authorized user has access to a company’s endpoint by continuously verifying the employee's identity throughout their logged-in session. An example of CEA is TypingDNA ActiveLock, which uses typing biometrics to keep unauthorized users out by validating their identities by the way they type.
Device Sharing threats
Device sharing is when a company endpoint is accessed by an unauthorized user. Device sharing doesn’t always occur because of malicious incentives, such as fraud. It often takes place in innocent or foolish situations, like when a remote employee lends their work computer to a family member
HIPAA Compliance Software
HIPAA compliance software refers to applications and systems used to secure protected health information (PHI). HIPAA Compliance software is not just building a security infrastructure to secure the backend operations and networks of a company, but it’s also choosing the right apps to secure the company’s endpoints.
Mouse Dynamics
Mouse Dynamics is a behavioral biometrics technology used to validate a user’s identity by analyzing unique patterns —such as tiny hand motions— detected in the user’s interaction with their mouse or pointer. Because it enables continuous authentication, mouse dynamics is a great fit for intrusion detection solutions.
Multi-Factor Authentication (MFA)
Multi-Factor Authentication, also known as MFA, is a process of multi-step identity verification that enhances security when a user logs in to an account, system, or application. MFA works through different methods called authentication factors.
Passive Behavioral Biometrics
To authenticate a person’s identity, passive behavioral biometrics analyze unique user behaviors—like how they type, walk, or talk. Behavioral biometrics work passively in the background, as opposed to physiological biometrics which are active and require the user to take specific actions like scan their face or fingerprints to prove their identity.
Payment Card Industry Data Security Standard (PCI DSS)
The Payment and Card Information Security Standard (PCI DSS) is a set of security regulations created by the major credit card brands. PCI DSS requirements encourage the security of payment and card information through a continuous compliance loop through which organizations assess, repair, and report how data is being handled.
Root of Trust
In cybersecurity, a Root of Trust (RoT) is a hardware, firmware, or software component that is inherently trusted. A Root of Trust is the foundation of any security process, such as identity validation. Think of the Root of Trust as a fallback method in case the first factor of authentication fails.
Two Factor Authentication (2FA)
Two Factor Authentication (2FA) is when a user proves their identity two times when accessing an account. Most common 2FA is putting in a unique code — received via SMS or email — in addition to entering the username and password combination. 2FA is the simplest form of multi-factor authentication (MFA).
Typing Biometrics
Typing biometrics (also known as keystroke dynamics or keystroke biometrics), is a form of behavioral biometrics embedded in people’s behavior when they type on a keyboard. Examples of typing biometrics use cases are two-factor authentication (2FA) for secure account access or continuous endpoint authentication (CEA) for enhanced enterprise security.
Zero Trust Security
Simply put, zero trust functions on the philosophy that because attackers can live both inside and outside the network, no identity should be automatically trusted even if they’ve authenticated themselves at the front door with a username and password.