Implementing F8th with external company's software
Project scope
Categories
Security (cybersecurity and IT security) Information technology Software development Artificial intelligenceSkills
php (scripting language) python (programming language) java (programming language) c# (programming language)Your task over the semester will be to implement F8th's system with an external company's software. You will work together with F8th to create a seamless integration where using F8th's MFA with Duo's MFA will happen at the same time. While you wouldn't be accessing the backend of either of these systems, you will be using F8th's SDK and inserting it into Duo's in a way where by integrating Duo's platform, F8th's will automatically start working alongside it.
There are a few potential languages you'll be working with. Specifically PHP and C# are the most likely, although there's a chance you may get to work with Python and Java as well.
1. Read implementation documentation
2. Lead PHP and C#, Python and Java and have a solid base in that
A team of at least 2-20 people will be required for this project. All project members will be part of an automated communication vehicle, such as Zoom. There will be regular virtual communication, work review and deliverable meetings. The project team members will receive support and will work closely with the Senior Software Engineer/Dev Lead and Co-Founder.
About the company
F8th’s mission is to provide solutions to organizations against the latest cyber threats, enforce user privacy and corporate data security, and mitigate the massive damages and losses caused by data breaches.
F8th’s behavioural biometric analysis (BBA) works by analyzing mouse, keyboard and touchscreen movements to discern the unique identity of the user. Unlike conventional two-step authentication systems, F8th uses artificial intelligence, machine learning and deep learning to analyze 100s of these inputs in real time to identify an authorized user vs a fraudster. Moreover, F8th passively protects the customer and corporate data by continuously authenticating users through their human behaviors. Unlike every other tracker, F8th uses data that websites need to provide services, hence it is not impacted by browser tracker blockers, and is completely compliant with the new data privacy regulations.