Stop Web Fraud and Enable E-Commerce<br />ThreatMetrix Fraud Network<br />Next<br />Generation<br />
Detect Stolen and Hijacked Credentials<br />Transactions<br />New Accounts<br />Logins<br />Identity Velocity<br />Device ...
Authenticate New and Returning Customers<br />Transactions<br />New Accounts<br />Logins<br />
ThreatMetrix Customer Problems<br />Transactions<br />New Accounts<br />Login<br />Account Hijack Prevention<br />Compromi...
Challenges with Legacy Solutions<br />Transactions<br />New Accounts<br />Logins<br />Authorization<br /><ul><li>Credit Ca...
3-D Secure (password) Inconvenient</li></ul>Verification<br /><ul><li>Stolen & Synthetic Identities on the rise
Geographic limitations
Privacy concerns</li></ul>Authentication<br /><ul><li>Username & Password unsecure
Upcoming SlideShare
Loading in...5
×

ThreatMetrix Fraud Network Presentation

1,306

Published on

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,306
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
44
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

ThreatMetrix Fraud Network Presentation

  1. 1. Stop Web Fraud and Enable E-Commerce<br />ThreatMetrix Fraud Network<br />Next<br />Generation<br />
  2. 2. Detect Stolen and Hijacked Credentials<br />Transactions<br />New Accounts<br />Logins<br />Identity Velocity<br />Device Anomaly<br />Access Anomaly<br />
  3. 3. Authenticate New and Returning Customers<br />Transactions<br />New Accounts<br />Logins<br />
  4. 4. ThreatMetrix Customer Problems<br />Transactions<br />New Accounts<br />Login<br />Account Hijack Prevention<br />Compromised Device Detection<br />Synthetic and Stolen Identity Protection<br />Chargeback and Loss Prevention<br />Financial Services<br />Gaming & Currency<br />CPA & <br />Alt payments<br />Social<br />Networks<br />Merchants &<br />Online Services<br />Fraud Management is Strategic to Business Operations<br />
  5. 5. Challenges with Legacy Solutions<br />Transactions<br />New Accounts<br />Logins<br />Authorization<br /><ul><li>Credit Card data hard to secure
  6. 6. 3-D Secure (password) Inconvenient</li></ul>Verification<br /><ul><li>Stolen & Synthetic Identities on the rise
  7. 7. Geographic limitations
  8. 8. Privacy concerns</li></ul>Authentication<br /><ul><li>Username & Password unsecure
  9. 9. Out of Band & Two Factor Authentication inconvenient or impractical</li></ul>Intelligence trapped within departments & organizations <br />
  10. 10. A Shared Problem Needs A Collective Solution<br />Transactions<br />New Accounts<br />Logins<br />ThreatMetrix Fraud Network<br />Authorization<br /><ul><li> Prevent Charge-backs
  11. 11. Increase Automation
  12. 12. Reduce False Rejects</li></ul>Verification<br /><ul><li> Reduce Abandonment
  13. 13. Increase Automation
  14. 14. Reduce Fraud Loss</li></ul>Authentication<br /><ul><li>Detect Device Compromise
  15. 15. Detect Account Compromise
  16. 16. Protect Brand</li></ul>Non-invasive, Real-time, Enterprise & Global Intelligence, <br />with no PII Leakage <br />
  17. 17. ThreatMetrix Fraud Network<br />Transactions<br />New Accounts<br />Logins<br />Secure Web API: Transaction Details & AnonymizedCredentials<br />SaaS Portal (Analyze, Report, Control)<br />Real-time Rules Engine with Behavior & Pattern Matching<br />Transaction Intelligence Network<br />Global Device Identification<br />
  18. 18. Design Requirements<br />Requirements<br />Transparent to site visitor<br />Easy to Integrate<br />Browser/OS/Device Independent<br />Real-time at Internet Scale<br />Proxy & Botnet Aware<br />Subversion resistant<br />Secure, available<br />Deployment flexibility<br />Shared Intelligence<br />Does not require PII<br />Transaction Aware<br />ThreatMetrix Design<br /><ul><li>SaaS, Secure Web API
  19. 19. Passive Device Profiling
  20. 20. Proxy Piercing & Botnet detection
  21. 21. Adaptive Device Identification
  22. 22. High speed matching/storage framework on commodity hardware
  23. 23. Packet Signature Detection combined with context data
  24. 24. Scalable, secure Inter-process communication platform </li>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×