ThreatMetrix Fraud Network Presentation
-
Upload
threatmetrix -
Category
Technology
-
view
1.625 -
download
1
description
Transcript of ThreatMetrix Fraud Network Presentation
Stop Web Fraud and Enable E-Commerce
No PII Required
Worldwide Network
Customer Configurable
Real-time
Easy to Install and Use
Transactions & Payments
New Account Origination Account Login
NextGeneration
Decision Management
Analyze Report Control
ThreatMetrix Fraud Network
Global Device Identification
Detect Stolen and Hijacked Credentials
Transactions New Accounts Logins
Identity Velocity Device Anomaly Access Anomaly
Authenticate New and Returning Customers
Transactions New Accounts Logins
ThreatMetrix Customer Problems
Account Hijack PreventionCompromised Device Detection
Fraud Management is Strategic to Business Operations
Synthetic and Stolen Identity Protection
Chargeback and Loss Prevention
Merchants &Online Services
CPA & Alt payments
SocialNetworks
Gaming & Currency
Financial Services
Transactions New Accounts Login
Challenges with Legacy Solutions
Authorization• Credit Card data
hard to secure• 3-D Secure
(password) Inconvenient
Intelligence trapped within departments & organizations
Verification• Stolen & Synthetic
Identities on the rise • Geographic limitations• Privacy concerns
Authentication• Username & Password
unsecure• Out of Band & Two Factor
Authentication inconvenient or impractical
Transactions New Accounts Logins
A Shared Problem Needs A Collective Solution
Authorization• Prevent Charge-
backs• Increase Automation• Reduce False Rejects
Verification• Reduce Abandonment• Increase Automation• Reduce Fraud Loss
Authentication• Detect Device Compromise• Detect Account Compromise• Protect Brand
Transactions New Accounts Logins
Non-invasive, Real-time, Enterprise & Global Intelligence, with no PII Leakage
ThreatMetrix Fraud Network
ThreatMetrix Fraud Network
SaaS Portal (Analyze, Report, Control)
Real-time Rules Engine with Behavior & Pattern Matching
Transaction Intelligence Network
Global Device Identification
Secure Web API: Transaction Details & Anonymized Credentials
Transactions New Accounts Logins
Design Requirements
ThreatMetrix DesignSaaS, Secure Web API
Passive Device Profiling
Proxy Piercing & Botnet detection
Adaptive Device Identification
High speed matching/storage framework on commodity hardware
Packet Signature Detection combined with context data
Scalable, secure Inter-process communication platform
Requirements
Transparent to site visitor
Easy to Integrate
Browser/OS/Device Independent
Real-time at Internet Scale
Proxy & Botnet Aware
Subversion resistant
Secure, available
Deployment flexibility
Shared Intelligence
Does not require PII
Transaction Aware