Page 48 - GS170901
P. 48
NewProduct
ThreatMetrix uses visualization, data correlation and
exception handling to continuously optimize authentication
and fraud decisions. It confirms linkages between
individuals and their connected devices and isolates
transactions requiring additional review. It also organizes
and analyzes historical and forensic data. Businesses
can adapt the platform according to their risk tolerances
Company: ThreatMetrix Inc. and operational metrics to maintain consistent security
Product: ThreatMetrix Dynamic Decision Platform procedures across all digital devices and channels.
Website: www.threatmetrix.com ThreatMetrix reported the platform's end-to-end capabili-
Contact: sales@threatmetrix.com ties and metadata gained from over 20 billion annual trans-
actions have reduced challenge rates and protected 1.4 bil-
Data-driven intelligence lion online accounts from fraudulent takeover.
Digital intelligence, delivered
for ecommerce protection The Dynamic Decision Platform's unique Digital Identity
Network provides additional tools and resources to help
businesses validate true digital identities and stop fraud
hreatMetrix Inc., a global security company before it happens, the company stated. Using shared
with headquarters in San Jose, Calif., enhanced intelligence garnered from millions of consumer logins,
its Dynamic Decision Platform, an integrated payments and new account originations, ThreatMetrix
T solution designed to help companies verify and analyzes device, location and anonymized personal
authenticate identities and behaviors across billions of information to create dimensional digital profiles. These
ecommerce transactions. The end-to-end solution uses the profiles are evaluated with each transaction to address the
company's shared intelligence network to differentiate following four pillars of digital identity:
between trusted customers and fraudsters, company repre- 1. Device profiling: A variety of technologies and ana-
sentatives stated.
lytics, used to assess connected devices, includes statis-
tical web and mobile device identification and analysis
ThreatMetrix described the Dynamic Decision Platform of operating systems, browsers, geolocation services
as a technology suite that combines behavioral analytics and Internet, VPNs and Proxy detection. The service
and machine learning to improve fraud detection and help can also detect mobile device health and application in-
organizations make informed, automated decisions in real tegrity, host application integrity, anomaly and device
time. It also uses data from third-party sources to identify spoofing detection and jailbreak and root detection.
and investigate anomalies, thereby improving exception
processing. Combining dynamic data with information 2. Threat intelligence: The network uses advanced and
from legacy systems can improve efficiencies, as well as the point-in-time technologies to detect a variety of threats,
overall digital experience, the company stated. which may include malware, rough auditing tools, au-
tomated bot attacks, session hijacking and phishing
"As the payments industry matures, consumer fraud is schemes.
also maturing; ecommerce merchants and their customers 3. Identity data: The platform uses anonymized, non-
are exposed to a range of threats and false positives and regulated personal information to detect and authen-
negatives," said Vanita Pandey, Vice President of Product ticate end-users, such as usernames, email addresses
Marketing at ThreatMetrix. "Merchants are not in the fraud and other related metadata provided at the time of a
management business; they should be free to focus on core transaction or event.
business and what they are selling. Advanced technologies
and shared intelligence helps us stay ahead of evolving 4. Behavior analytics: By combining identity and trans-
fraud in all its forms." actional metadata with device identifiers, connection
and location characteristics, the platform can create a
Advanced, real-time decisions pattern of individual user behavior that can be used to
authenticate digital identities.
Diversified populations of connected devices, along with
increasingly complex end-user behaviors, pose additional "The combination of passive strong authentication methods
challenges to organizations, Pandey stated. It's not easy to and global shared intelligence can protect merchants and
verify and authenticate the digital identities of users who consumers who transact online," Pandey stated. "It can
log in from multiple devices, locations and channels. A also protect our ISO partners and their merchants, by
more nuanced and intelligent authentication process that streamlining the onboarding process, preventing account
uses behavioral analytics and crowd-sourced data can help takeovers and detecting insider threats."
companies accurately identify connected users.
48