TECHNOLOGIES
NoFraud is a fully managed, multi-tiered system of fraud prevention technologies seamlessly combined.
5technologies 4e1d09330e7cc284fc1c0b4aa0aac406ee23652c408f22cbc0a9c6cbdd9b5d06
Device fingerprinting
NoFraud uses device fingerprinting to gain baseline information about the customer
8technologies 915dd44ece0789a2cdd6b763ddd20ef221c8334d2e1a0f83b5e4f962d6b4c20f
IP Geolocation
IP Geolocation allows NoFraud to compare the device location to the billing or shipping address
4technologies cab39b7338fcb8a9439085b140f1628d3e7d19fb8df65c9557a31128fa379d80
proxy piercing
Proxy piercing detects if the customer is actually where he or she claims to be
10technologies e565db10e9069cd73a9507fe2a845a23ec15bd46770af31fd50f9dee77ac8f08
Intelligent monitoring
Monitors future transactions to retroactively flag past transactions as fraudulent when new data becomes available
7technologies 34dbdcc8d712bb708bc2e138a7e35300bcc555090c884f2c64bd072103a36263
Velocity detection
Monitors transaction velocity to identify risk through related transactions in close succession
12technologies 790cdef121e6a9e780255fb7cbfe781ffc0b6d1ab5e4524718ddbff0ec70c52d
Persona tracking
Persona tracking identifies order characteristics and customer behavior to establish risk
13technologies 497e026cd797138d7d8b5cfd183c63b2585a8cfda29421134a6a3f8cd40995db
verify identity
Pulls data from social media databases to verify identity
2technologies d839454b5672a843d7bb8afed557d329cf5930e8f0d0350ab19aa594371991af
cross reference
NoFraud accesses bank identification numbers to cross-reference banks' information on a customer's location
6technologies 826a2e95a32d17b04c5ed37a14de2e0ef7322772563cb47db2bae592107eaeb9
black lists
Utilizes global and merchant-specific black lists to cross-reference transactions
9technologies 5f31043392b21a781cc571a59345a4b4ce5200f0b2c3c89c2317790386307fba
global blacklists
Monitors global customer blacklists
1technologies 3c30fdd33215014b7529a4add87c19396478de2ea889499532c32069388dd9ac
Examine bank
Examines bank identification numbers
11technologies 7ac986b037f1c763f00659d73ac4b34e1f514a7e3e26db1503a7d28a80924bc5
Merchant specific data
Allows incorporation of merchant-specific data points and customer lists
Guard cc4d04b31754895d89f2373e49f424ec7cc575df5d1be4c4ca5df4a1ae68784b
Our staff have developed an algorithm that is far superior to alternatives, allowing us to offer the lowest billing rates.
3technologies 9244c0773b2176de468b41bcde295c999854b66dc1d543a9fcf9633646412d1d
Address Verification and Card Verification Number service is built directly into the system.
how it works - multiple levels of fraud prevention
1
Smartverification bf7476e348c92824beb17604ed11cb899ee020f0c8e5c38e22674eb8ec9a7f55
SMART VERIFICATION
Digital Identification
Data is cross-referenced with external databases, including IP, Device, Proxy, Global Blacklists, and other historical data, to identify red flags and collect user activity that may add risk.
Behavior Analysis
Advanced machine learning algorithms scrutinize user behavior to identify trends that add additional risk. Areas vetted include Geo-location, Transaction Velocity, Cross-Transaction Data, High-Risk Characteristics, and Persona Analysis.
Data Validation
User provided data is analyzed and cross referenced for inconsistencies, enabling our system to distinguish typos from fraud. Data sources include AVS, CVV/CVV2, BIN, Social Data and publicly available information.
2
Humanintelligence 816ddc60ba07941040644e9148680c4cea673b8be5b93baac5b2f4828cd929c4
HUMAN INTELLIGENCE
Transaction Monitoring
Nearly every declined transaction is looked over by a fraud expert, as well as selected approved transactions, to ensure nothing goes unnoticed.
Live Cardholder Verification
Where cardholder contact information is verifiable, NoFraud will contact a customer directly to confirm the legitimacy of their order before declining a flagged transaction.
White/Black Lists
Merchants retain access to their account and can make the decision to approve or decline a customer or specific transactions.