04.09.2015 Views

Transaction Security

H017WR70

H017WR70

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CEO Interviews<br />

Reed Taussig, ThreatMetrix (cont.)<br />

“Persona ID, used<br />

to create<br />

ThreatMetrix<br />

digital identities, is<br />

a powerful tool to<br />

identify both<br />

fraudsters and<br />

good customers<br />

before that online<br />

provider provides<br />

access to their<br />

services…”<br />

Alternatively, in the case of a new account application where I have never seen that customer before ThreatMetrix customers using Persona<br />

ID can passively profile and evaluate that consumer’s digital identity to make a determination if they want to extend that person credit or<br />

access to their site without direct customer participation. ThreatMetrix knows that good customers have good profiles that consist of a<br />

reasonable and expected number and type of credentials. So a customer that has been associated with 40 or more devices, 30 separate<br />

email addresses and 25 credit cards can be considered to be a bad actor whereas a customer that operates across let’s say three devices,<br />

an acceptable number of credit cards and email addresses can probably be considered a good customer.<br />

Persona ID, used to create ThreatMetrix digital identities, is a powerful tool to identify both fraudsters and good customers before that online<br />

provider provides access to their services, credit or in the case of social networking sites, their other valuable customers.<br />

Layer 3 of the ThreatMetrix solution provides ThreatMetrix customers with the ability to validate consumer behavior based on the actual<br />

experiences of all ThreatMetrix customers who may have interacted with that given consumer. We call this capability ThreatMetrix Trust Tags<br />

and they are possible due to our fully privatized shared global intelligence.<br />

For example, if I am online retailer of baseball tickets, it would be useful for me to know if the consumer who is attempting to purchase a ticket<br />

as a card-not-present “CNP” transaction was successful with another CNP transaction at one or more of ThreatMetrix’s 4,000 global<br />

customers using the same the same or similar credentials. If in fact this consumer did use these same credentials to purchase another<br />

product of similar value within the last 30 days at another ThreatMetrix customer, my confidence that this consumer is an authentic customer<br />

and not a fraudster is going to increase.<br />

ThreatMetrix Trust Tags are used by a wide variety of ThreatMetrix customers across the financial services, e-commerce and media markets<br />

to passively authenticate and approve good customers as well as to recognize bad actors based on the actual behavior of those individuals<br />

across the ThreatMetrix customer base.<br />

Layer 4 of the ThreatMetrix solution incorporates visual forensics providing our customers the ability to review, approve, reject, research and<br />

manage their transaction data in the ThreatMetrix system.<br />

The 4 integrated layers of the ThreatMetrix technology are designed to provide customers with a completely passive, tokenized, real-time<br />

system to help them recognize good returning customers and to identify fraudsters.<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!