Page 48 - GS170901
P. 48

NewProduct





                                                               ThreatMetrix uses visualization, data correlation and
                                                               exception handling to continuously optimize authentication
                                                               and fraud decisions. It confirms linkages between
                                                               individuals and their connected devices and isolates
                                                               transactions requiring additional review. It also organizes
                                                               and analyzes historical and forensic data. Businesses
                                                               can adapt the platform according to their risk tolerances
                  Company: ThreatMetrix Inc.                   and operational metrics to maintain consistent security
                  Product: ThreatMetrix Dynamic Decision Platform  procedures across all digital devices and channels.
                  Website: www.threatmetrix.com                ThreatMetrix reported the platform's end-to-end capabili-
                  Contact: sales@threatmetrix.com              ties and metadata gained from over 20 billion annual trans-
                                                               actions have reduced challenge rates and protected 1.4 bil-
        Data-driven intelligence                               lion online accounts from fraudulent takeover.

                                                               Digital intelligence, delivered
        for ecommerce protection                               The Dynamic Decision Platform's unique Digital Identity

                                                               Network provides additional tools and resources to help
                                                               businesses validate true digital identities and stop fraud
                 hreatMetrix Inc., a global security company  before it happens, the company stated. Using shared
                 with headquarters in San Jose, Calif., enhanced  intelligence  garnered  from  millions  of  consumer  logins,
                 its Dynamic Decision Platform, an integrated  payments and new  account  originations,  ThreatMetrix
        T solution designed to help companies verify and  analyzes device, location and anonymized personal
        authenticate identities and behaviors across billions of  information to create dimensional digital profiles. These
        ecommerce transactions. The end-to-end solution uses the  profiles are evaluated with each transaction to address the
        company's shared intelligence network to differentiate  following four pillars of digital identity:
        between trusted customers and fraudsters, company repre-   1. Device profiling: A variety of technologies and ana-
        sentatives stated.
                                                                   lytics, used to assess connected devices, includes statis-
                                                                   tical web and mobile device identification and analysis
        ThreatMetrix  described  the  Dynamic  Decision Platform   of operating systems, browsers, geolocation services
        as a technology suite that combines behavioral analytics   and Internet, VPNs and Proxy detection. The service
        and machine learning to improve fraud detection and help   can also detect mobile device health and application in-
        organizations make informed, automated decisions in real   tegrity, host application integrity, anomaly and device
        time. It also uses data from third-party sources to identify   spoofing detection and jailbreak and root detection.
        and investigate anomalies, thereby improving exception
        processing. Combining dynamic data with information        2. Threat intelligence: The network uses advanced and
        from legacy systems can improve efficiencies, as well as the   point-in-time technologies to detect a variety of threats,
        overall digital experience, the company stated.            which may include malware, rough auditing tools, au-
                                                                   tomated bot attacks, session hijacking and phishing
        "As the payments industry matures, consumer fraud is       schemes.
        also maturing; ecommerce merchants and their customers     3. Identity data: The platform uses anonymized, non-
        are exposed to a range of threats and false positives and   regulated personal information to detect and authen-
        negatives," said Vanita Pandey, Vice President of Product   ticate end-users, such as usernames, email addresses
        Marketing at ThreatMetrix. "Merchants are not in the fraud   and other related metadata provided at the time of a
        management business; they should be free to focus on core   transaction or event.
        business and what they are selling. Advanced technologies
        and shared intelligence helps us stay ahead of evolving    4. Behavior analytics: By combining identity and trans-
        fraud in all its forms."                                   actional metadata with device identifiers, connection
                                                                   and location characteristics, the platform can create a
        Advanced, real-time decisions                              pattern of individual user behavior that can be used to
                                                                   authenticate digital identities.
        Diversified populations of connected devices, along with
        increasingly complex end-user behaviors, pose additional   "The combination of passive strong authentication methods
        challenges to organizations, Pandey stated. It's not easy to   and global shared intelligence can protect merchants and
        verify and authenticate the digital identities of users who   consumers who transact online," Pandey stated. "It can
        log in from multiple devices, locations and channels. A   also protect our ISO partners and their merchants,  by
        more nuanced and intelligent authentication process that   streamlining the onboarding process, preventing account
        uses behavioral analytics and crowd-sourced data can help   takeovers and detecting insider threats."
        companies accurately identify connected users.

        48
   43   44   45   46   47   48   49   50   51   52   53