Saturday, June 7, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Strong Security or Superior Consumer Experience? The False Dilemma of the Online Gatekeepers

SBN

Strong Security or Superior Consumer Experience? The False Dilemma of the Online Gatekeepers

by Liam Maxwell on February 14, 2024

Today’s online businesses are faced with equally important but seemingly antithetical objectives: Keeping the bad actors out while letting the good users through.

Cybersecurity professionals are constantly battling against an array of threats, from automated bots to sophisticated phishing schemes. The mission is clear: Safeguard sensitive data, protect against financial loss, and uphold the trust of customers.

Meanwhile, consumers expect seamless access to services and frictionless transactions. Whether they’re logging into their financial accounts, making purchases, or simply browsing your site, users demand a smooth and hassle-free experience. Any obstacles, such as cumbersome authentication processes, can quickly erode trust and drive consumers away to competitors.

Techstrong Gang Youtube
AWS Hub

The good news? Businesses don’t have to choose between stringent security measures and user-friendly experiences. Achieving that perfect balance of great user experience and stopping bad actors is well within reach.

Clear, Block, or Challenge

The typical process of evaluating the safety of an online session starts with the business doing some level of threat assessment and then making a determination to allow the user to move forward, deny that service, or challenge the user.

Outright blocking a good user is the most aggressive form of friction, but this creates an experience that is definitely not good for business. If good users are incorrectly determined to be bad actors (false positives), then they get completely blocked, and their only recourse is typically to call customer service and request help. This is user experience friction at its worst, and a high-cost model for dealing with the situation with a call center.

A close relative of the outright blocking approach – and one that can be almost as annoying to your genuine consumers – is to challenge a large percentage of your traffic.
This means subjecting a significant portion of users to additional authentication measures or security checks, even if they pose no apparent risk.

While this strategy aims to err on the side of caution, it often results in unnecessary friction for legitimate users, tarnishing the overall user experience. Users may find themselves repeatedly interrupted with CAPTCHAs or multi-step verification processes, leading to frustration and potentially driving them away from your platform.

Moreover, this approach adds operational complexity and overhead costs, as businesses must dedicate resources to managing and resolving user complaints and inquiries stemming from these challenges.

How a Rideshare Giant Balances SMS Toll Fraud Security with Great User Experience
RECOMMENDED RESOURCE
How a Rideshare Giant Balances SMS Toll Fraud Security with Great User Experience
ACCESS

Behind-the-scenes Assessment of Genuine Traffic

Arkose Labs takes a different approach, one that relies on pinpointing the risk that each online session generates so that only high-risk user sessions see any active intervention. In the overwhelming majority of cases, users never see any type of challenge while the process operates seamlessly in the background.

Rather than subjecting all users to the same blanket security measures, we employ advanced technology to analyze user behavior and distinguish between genuine users and potential threats. This technology relies on a combination of factors, including user behavior patterns, device fingerprinting, geolocation data, and real-time threat intelligence.

By analyzing these diverse data points, we create a comprehensive profile of each user’s digital footprint, enabling us to detect anomalies and flag suspicious activity accurately. This granular approach allows us to tailor our security measures to the specific risk profile of each user, minimizing false positives and ensuring that genuine users can access services smoothly.

By dynamically adjusting our response based on the level of risk detected, we ensure that legitimate users face minimal friction while effectively thwarting malicious activity. In an overwhelming majority of cases, the genuine consumer will never know
they have encountered any security measures at all, as they seamlessly navigate through your website or app without interruption.

This enables your business to strike that perfect balance between the good user experience and stopping threats – while allowing any false positives to easily remediate the situation by playing through a game that takes a few seconds of their time.

Precision Targeting of Challenges

In a typical deployment, Arkose Labs will initially evaluate the threat landscape by transparently (zero friction) monitoring the session traffic and evaluating what egregious threat signals we are seeing. We then collaborate with the business to determine which of these threats have clear attack signatures that are indicative of situations where they want to challenge the user, to make sure they are bad actors and not good users.

Arkose Labs can then tune for this threat and precisely target how to challenge the traffic. This precision tuning can be based on attack signature, geolocation of the user and basically any telemetry that we collect or the customer provides to us.

Real attack example with precision targetting and mitigation

In the example above, we isolated the attack signature for two different attacks on a customer user experience. The purple line represents the good user and healthy traffic, while the dark blue spikes represent attempts to bypass our technology by simply blocking JavaScript, and the dark blue deeper wide segments represent bot-assisted human fraud farms. In both of the cases, we were able to isolate the attack signature for each attack, and provide the appropriate challenge to stop both bot and human attacks.

Suspicious sessions are presented Arkose MatchKey challenges, real-time challenges that make it difficult for cybercriminals to use automation (bots and botnets) to solve. And when attackers pivot to human labor, we leverage challenges that are time-consuming for humans to solve at scale.

Genuine consumers, however, seamlessly navigate through these challenges and quickly move on to doing what they were intending to do: interact with your online property.

By adopting this innovative approach, your business can confidently navigate the complex landscape of online security, knowing that you are effectively protecting your platforms while delivering a frictionless experience for your valued consumers.

Learn more about how to create seamless user experiences with Arkose Bot Manager.

*** This is a Security Bloggers Network syndicated blog from Arkose Labs authored by Liam Maxwell. Read the original post at: https://www.arkoselabs.com/blog/securing-great-consumer-experience/

February 14, 2024February 14, 2024 Liam Maxwell account security
  • ← Understanding Broken Object Level Authorization (BOLA) Vulnerability in API Security
  • Securing The Software Delivery Pipeline With Honeytokens →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Cloud Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Akamai Extends Cybersecurity Reach to DNS Posture Management
Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps
Yet Another Exposed Database, This Time with 184 Million Records
Microsoft Open Sources GitHub Copilot: A New Era for AI Coding
Multiple High-Risk Vulnerabilities in Microsoft Products
Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide
How Morpheus AI Automates the Entire L1 & L2 Pipeline
Interlock and the Kettering Ransomware Attack: ClickFix’s Persistence

Industry Spotlight

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities 

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

June 4, 2025 Richi Jennings | 2 days ago 0
USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | May 30 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | May 29 0

Top Stories

Zscaler Tightens AI Security With New Tools
Application Security Cybersecurity Data Privacy Data Security Featured Network Security News Social - Facebook Social - LinkedIn Social - X Zero-Trust 

Zscaler Tightens AI Security With New Tools

June 5, 2025 Jon Swartz | 1 day ago 0
Microsoft Launches Free Security Program for European Governments
Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft Launches Free Security Program for European Governments

June 4, 2025 Jeffrey Burt | 2 days ago 0
Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities

June 3, 2025 Jeffrey Burt | 3 days ago 0

Security Humor

Facebook CEO Mark Zuckerberg announces the plan to make Facebook more private at Facebook’s Developer Conference on April 30, 2019

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×