mSIGNIA, Inc. Named Finalist in Info Security Products Guide Awards



Nashville, TN – January 2016 – mSIGNIA, Inc. announced today that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named mSIGNIA, a finalist for the 12th Annual 2016 Global Excellence Awards in the New Product or Service Announcement Category. These prestigious global awards recognize security and IT vendors with advanced, ground-breaking products and solutions that are helping set the bar higher for others in all areas of security and technologies.

The mSIGNIA fraud prevention platform authenticates digital personas and mobile transactions to stop cybercrime. mSIGNIA enables application or service providers to reduce fraud and account takeover by recognizing good vs. bad users based on contextual identity. Its patented technology uses data analytics to provide a zero-friction, two-factor fraud prevention solution for browser logins and a secure TouchID experience for all mobile apps.

“We are proud to be recognized as an industry player whose mSIGNIA have been named finalist by Info Security Products Guide,” says CTO, Paul Miller. “Behind this distinguished success is our relentless drive to stay customer focussed. We believe this recognition from Info Security Products Guide further validates our commitment to our customers and their security needs.” 

About Info Security Products Guide Awards

SVUS Awards organized by Silicon Valley Communications are conferred in 10 annual award programs: The Info Security’s Global Excellence Awards, The IT Industry’s Hot Companies and Best Products Awards, The Golden Bridge Business and Innovation Awards, and Consumer World Awards, CEO World Awards, Customer Sales and Service World Awards, The Globee Fastest Growing Private Companies Awards, Women World Awards, PR World Awards, and Pillar Employee Recognitions World Awards. These premier awards honor organizations of all types and sizes from all over the world including the people, products, performance, PR and marketing. To learn more, visit

About mSIGNIA, Inc.

mSIGNIA’s leadership team has over 40 years in combined mobile security knowledge and implementation. They have led numerous, innovative mobile security efforts with start-ups and international vendors such as Symantec, GTE, and Cybertrust.

mSIGNIA offers the market’s best-in-class frictionless mobile authentication and device recognition solution, helping businesses limit risk, reduce fraud and enhance the customer experience within their fastest-growing digital channels. By combining dynamic contextual authentication and intelligent behavior data analytics, mSIGNIA provides a secure user experience for browser access and mobile apps that protect businesses and end users from account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches.

For more information please visit

How Behavioral and Contextual Security Keep Your Mobile Information Safe


By: Paul Miller, CEO of mSIGNIA

The phone has come a long way, from its inception with Alexander Graham Bell to the brick phone in the 80’s all the way to today’s miniature computer. It’s hard to imagine going about our day-to-day activities without today’s mobile devices, especially now that they contain our entire lives: contacts, photos, music, video, health records and personal history, not to mention access to a world of information via the Internet. They are as powerful as a roomful of computers was a generation ago, and as personal as a toothbrush.

As with storing any personal data, there is a certain amount of risk involved if the phone were to be lost or stolen, but if collected and analyzed that precious data can give these devices such a distinct, one-of-a-kind fingerprint that it can actually increase the security of every electronic transaction. When discussing all the different forms of user authentication, the terms “contextual security” or “behavioral security” come into play, but what do they actually mean? Here’s how they relate to one another.


Contextual Security evaluates data from the end user to improve risk decisions. This includes attributes such as, geo-location, device IDs, device fingerprints, time stamps, IP addresses. When a user signs in for a service, this information is compared to previous interactions to evaluate whether this is the legitimate owner or a fraudster.

Behavioral Security has two aspects: user behavior and app behavior. It tracks a user’s typical navigational patterns when visiting a site or using a mobile app, including buying patterns, clicking behavior, swipe patterns etc. These actions are recorded and learned over time and are mapped to returning users to determine normal behavior.

App behavior, on the other hand, observes whether or not the app is behaving normally. If it is suddenly sending text messages to premium rate phone numbers, for instance, a warning flag could go up to alert users of potential fraudulent activity.

Is one method better than the other?
Contextual security is more broadly deployed today, as device ID, fingerprinting and GPS locating are common. Behavioral security is a newer approach that is gaining traction. For optimal protection, both are needed. They compliment each other and provide a better overall view of the risk decision. Sophisticated hybrids of contextual and behavioral security are emerging. “What you have” and “what you do” combine to form a richer set of identifying data to ensure the authenticity of the user by recognizing the device in their hand or pocket.

Everything a user adds to their device, such as contacts, calendar events and music, is constantly changing, and when combined with geo-location sets and usage patterns creates a data behavioral model that is truly as unique as a fingerprint.

Creating a new standard for authentication:
The password used to be the de-facto standard, with some “invisible” secondary factor such as geo-location or device ID recognition added at the back end for good measure. But now, organizations should look to provide as frictionless an experience as possible to the user by authenticating them via these invisible methods, while assuring that they are indeed using a secure service. A rich combination of contextual and behavioral data can recognize users so accurately that no further authentication methods are needed to keep that user and their transactions secure.

Obviously the more data collected about a user, the better organizations are able to recognize them. The distinction at this point needs to be made on being able to recognize the data and the unique patterns it contains, without intruding upon the privacy of the user. For example, an authentication program might know how many contacts or photos one has on a device, but it would not have access to those contacts or photos.


So what do customers need to know to keep their information safe?

1. Safe Environment.
Ensure that endpoints on a system, whether they are a mobile device, tablet or browser, are free of malware, that apps hasn’t been tampered with, and that the operating system is legitimate.

2. Layers of Encryption
Make sure any data that’s being stored, both in the client, on the back end or in transit, is encrypted so that nothing is being stored or transmitted in the clear.

3. Frictionless Authentication
Make sure the device ID is in place, and include contextual and behavioral authentication components, as needed depending on the use case. Frictionless authentication is becoming more and more critical. The user does not wish to be bothered, so the more that can be accomplished behind the scenes the better.

The day is at hand when the smart phone in a user’s pocket will become the gatekeeper to every digital transaction they make, recognizing their unique contextual and behavioral data to validate their identity. In turn these methods will encourage brand loyalty and ensure that end users get the quality mobile experience they demand when conducting transactions online. 

 About the Author:
Paul Miller is a Co-Founder and Chief Executive Officer of mSIGNIA, Inc., a company that uses patent-pending data analytics to validate device, software and user personalization data to protect against fraud, malware and identity theft. Mr. Miller has specialized in mobile and token-based security for the last 17 years. Prior to this, he served in leadership roles for both global companies and start-ups. At $6B Symantec, makers of Norton Internet Security, he served as Managing Director for Mobile Security with global responsibilities for their mobile strategy and business.