Automation

Using advanced machine learning technology, we screen transactions in real time, eliminating review bottlenecks and allowing you to fulfill your orders quickly, increasing customer satisfaction.

Automation 4d051f0a34b94a1db600c39b5e29ab83b4f9919f6e335f43ddb3f309d5e110cf

Simplicity

We give you simple actionable decisions of Pass or Fail, so that you don’t need to be a fraud expert and allowing you to focus on what you do best.

Simplicity 65c54f3206d25d59451cc8eb7bd4799845fdc77015ef28710042b31b67075892

Human Intelligence

Select high-risk transactions are placed under review. Our expert team of fraud analysts scrutinizes the transactions for validation, resulting in dramatically increased approval rates.

Intelligence 45665ce68715cfd387ded41fd15deb06cff2671a40df9abaefebc058834cc14b

Technology:

1 54c6e83e173f1b489c92601a604edcabcc37630aeb8317ed03943150e0ba30c7

Device Identification

Track the customer's device and its history

2 08983e047455ba8112353979fa751414a316cf17ffcf9e510b3ef41bccc13851

Geolocation

Pinpoint the origin of the user placing the transaction

3 cfecec4341d6322de7bd8bc60d20a2d44b9820939ce7e69b075fa5d4f5cac07a

Proxy Piercing

Detect a customer attempting to mask their IP

4 3b5d8186fa950cc81579af3db02a2dbfeb468b515acf0d70c35f85990f215e54

Retroactive Monitoring

Continuously screen transactions as new data become available

5 a27d323a5ea52f881b3399a025de5f71307ff6615e7db655a791310d98dbf005

Velocity Guard

Monitor related transaction data in close succession

6 b7a8d0c28d5651b19aee2b029b1109ea7fac04053d2fd12f937b43d5fc7c7eac

Persona Tracking

Identify transaction characteristics and customer behavior

7 708f7f6a6ac82accb47b373ecf43b917c4ea69ef506510032d3292b4ff49064e

Identity Guard

Screen for identity fraud characteristics

8 70f97d7e9a9eddf6365dba2faa604127cb812a7be4951bcf5406b595b84fc2bb

Data Validation

Validate the authenticity of customer-provided data

9 e1c94ca3d0c02d5e5e53c9aebe512e4ab487714627d9e9d92fefc3232f018c6a

Rapid Detect

Identify new patterns as they emerge

10 4f6883fc0de1b5b6a94e10fd8c22fc03d451983e45bd384cbab147776fff0419

Global Blacklists

Utilize global compromised data lists

11 4e96e977469e16ce93e1dcea22a94dc217f6a1338e5230e4f58ae4427a4a1961

Bank Identification

BIN, AVS, CCV considered in fraud risk

12 d612c299cc454a2d9441773657ae3fce303ce87d392ae63314050be57eec9416

Merchant-Specific Data

Incorporate merchant-specific data and behavioral metrics