Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

AiThority Interview with Shahrokh Shahidzadeh, CEO at Acceptto Corporation

AiThority Interview with Shahrokh Shahidzadeh , CEO at Acceptto Corporation

Know My Company

How do you interact with the new-age technologies like Cloud Computing, AI, Machine Learning and Mobile Applications?

Today we are in a password and data breach crisis. Acceptto enables an end-to-end unified authentication solution to cross mobile, web and workstations using behavioral modeling and AI ML powered mixture of expert systems. We deliver pre-auth intelligence, context-aware risked base authentication and continuous authentication even post-authorization.

How did you start in this space? What galvanized you to start at Acceptto?

We started with a base fundamental assumption of “what if all passwords are already breached, even those not yet created!” and had a fun bet amongst ourselves if we could solve such a complex challenge. This implied that we would need to make passwords benign where they were the core of our authentication for decades making it a very complicated proposition.

We recognized that the obsolescence of passwords is upon us and that we need to take a different approach dealing with the state of cyber crisis ahead. A crisis that eventually would result in a continuous series of disastrous daily breaches that would eventually result in billions of private and sensitive financial and health records.

Read More: AiThority Interview with Jean-Simon Venne, CTO at BrainBox AI

What is Acceptto and how does it leverage AIML for behavioral authentication?

Acceptto is an analytics company delivering continuous authentication vs. the traditional binary authentications such as passwords, two-factor, and many multifactor authentication solutions. Our Continuous Behavioral Authentication™ analyzes & verifies user identity and behavior by inferring contextual data associated with the user and their individual login and transaction.

We use an AIML powered mixture of experts that uses behavioral modeling to eliminate the need for passwords. This approach enables identification of bad/suspect actors, all while reducing friction for legitimate users.

What is Biobehavioral Authentication and how does it prevent cyber-fraud and data hacking?

Biobehavioral™ Authentication is a proprietary solution that uses modern context-aware techniques invented by Acceptto technologists. It uses a mixture of AIML expert systems to identify anomalies and prevent unauthorized access.  By analyzing the user behavior, device, browser, and the digital DNA and habits of the user Biobehavioral Authentication delivers an unrivaled end to end security solution to IT professionals that are looking for Next-generation Authentication to keep company data secure from unauthorized access.

Read More: AiThority Interview with Rajeev Gollarahalli, Chief Business Officer at 42Q

Who are your customers and how do they leverage your products/ services?

Acceptto’s customers are found in industries that have security and privacy requirements that demand Next-generation authentication that relies on behavioral modeling. This includes industry verticals such as financial, health, insurance, higher ed. Our primary target market consists of enterprises with typically >300 employees or services a customer base of >3000.

We cater to our clients who have the need and appetite for Next-generation authentication addressing a number of core challenges associated with authentication:

  • High-security risks, friction, and cost of passwords. Again, remember all passwords are compromised, we just do not know about it yet; Even those we have not yet created! This makes the password very costly. Reset passwords, breached data and call center costs rack up quickly.
  • The perimeter’s new boundary is the cloud, making any strategy that is not hybrid a nonstarter.
  • Greater need for focus on authentication post authorization, given that all evil happens post-authorization.
  • Missing a unified authentications solution covering mobile, web and workstation apps delivering a user journey.
  • Compliance and Audit (provisioning and access management of employees and contractors)
What is the biggest challenge to Digital Transformation in the market you cater to? How does Acceptto contribute to a successful Digital Transformation?

The greatest challenge to Digital Transformation in the market is the password and the risk and costs they add to the enterprise. We recognized early on that the obsolescence of passwords is upon us and that we need to take a different approach dealing with the state of cyber crisis that was coming.

Read More: AiThority Interview Series with Jeff Epstein, VP of Product at Comm100

What is your opinion on “Weaponization of AI and Machine Learning”? How do you promote your ideas in Digital Economy?

It’s possible to mask user activities with AI which is why we recommend pairing any AI technology with a mix of Machine Learning (AIML), expert systems and behavioral modeling. In theory, systems can be tricked by mimicking a legitimate online-appearance and satisfying all criteria that the AI has learned.

Taking the behavior of the user into account is very important. While everybody can train an AI to detect anomalies and likewise train an AI to trick such a system, it is very complex to mimic the human behavior of an individual. Again, it is Machine Learning that deduces simplified models of human behavior that are capable to assess, yes, even predict future actions. And again, this simplification has consequences as different behaviors could erroneously be accepted (i.e. false positives).

The Crystal Gaze

What digital technology start-ups and labs are you keenly following?

SpaceX

What technologies within your industry are you interested in?
As a tech leader, what industries you think would be fastest to adopting AI in car-making with smooth efficiency? What are the new emerging markets for these technology markets?
  • FSI
  • Health

Read More: AiThority Interview Series With Scot Marcotte, Chief Technology Officer at Buck

Tag the one person in the industry whose answers to these questions you would love to read:

Brian Krebs

@briankrebs

Thank you, Shahrokh! That was fun and hope to see you back on AiThority soon.

Shahrokh Shahidzadeh leads a team of technologists, driving a paradigm shift in Cybersecurity through Acceptto’s Cognitive Continuous AuthenticationTM. Shahrokh is a seasoned technologist and leader with 27 years of contribution to modern computer architecture, device identity, platform trust elevation, large IoT initiatives and ambient intelligence research with more than 20 issued and pending patents. Prior to Acceptto, Shahrokh was a senior principal technologist contributing to Intel Corporation for 25 years in a variety of leadership positions where he architected and led multiple billion dollar product initiatives.

Acceptto is a transformative cyber security company that is driving a paradigm shift in identity access management. Their AIML powered Cognitive AuthenticationTM technology analyzes and verifies user identity, inferring contextual data such as device and browser attributes, spatiotemporal velocity, user habits, and network anomaly detection signals, etc. to detect and prevent identity access fraud across the enterprise and their end consumers. Acceptto delivers the smartest, most resilient and evasion-proof identity validation technology commercially available today for physical, web, mobile, cloud and IoT devices. The company is headquartered in Portland, USA with offices in Lisbon, Portugal, and Vancouver, Canada, serving global active customers in healthcare, education, and financial services.

1 Comment
  1. Adana’da eşi cezaevinde yatan 17 yaşındaki 1 çocuk annesi G.Y., annesinin arkadaşının,
    uygunsuz görüntülerini çekerek şantaj ve tehdit.

Leave A Reply

Your email address will not be published.