Transaction Security
H017WR70
H017WR70
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CEO Interviews<br />
Reed Taussig, ThreatMetrix (cont.)<br />
“Persona ID, used<br />
to create<br />
ThreatMetrix<br />
digital identities, is<br />
a powerful tool to<br />
identify both<br />
fraudsters and<br />
good customers<br />
before that online<br />
provider provides<br />
access to their<br />
services…”<br />
Alternatively, in the case of a new account application where I have never seen that customer before ThreatMetrix customers using Persona<br />
ID can passively profile and evaluate that consumer’s digital identity to make a determination if they want to extend that person credit or<br />
access to their site without direct customer participation. ThreatMetrix knows that good customers have good profiles that consist of a<br />
reasonable and expected number and type of credentials. So a customer that has been associated with 40 or more devices, 30 separate<br />
email addresses and 25 credit cards can be considered to be a bad actor whereas a customer that operates across let’s say three devices,<br />
an acceptable number of credit cards and email addresses can probably be considered a good customer.<br />
Persona ID, used to create ThreatMetrix digital identities, is a powerful tool to identify both fraudsters and good customers before that online<br />
provider provides access to their services, credit or in the case of social networking sites, their other valuable customers.<br />
Layer 3 of the ThreatMetrix solution provides ThreatMetrix customers with the ability to validate consumer behavior based on the actual<br />
experiences of all ThreatMetrix customers who may have interacted with that given consumer. We call this capability ThreatMetrix Trust Tags<br />
and they are possible due to our fully privatized shared global intelligence.<br />
For example, if I am online retailer of baseball tickets, it would be useful for me to know if the consumer who is attempting to purchase a ticket<br />
as a card-not-present “CNP” transaction was successful with another CNP transaction at one or more of ThreatMetrix’s 4,000 global<br />
customers using the same the same or similar credentials. If in fact this consumer did use these same credentials to purchase another<br />
product of similar value within the last 30 days at another ThreatMetrix customer, my confidence that this consumer is an authentic customer<br />
and not a fraudster is going to increase.<br />
ThreatMetrix Trust Tags are used by a wide variety of ThreatMetrix customers across the financial services, e-commerce and media markets<br />
to passively authenticate and approve good customers as well as to recognize bad actors based on the actual behavior of those individuals<br />
across the ThreatMetrix customer base.<br />
Layer 4 of the ThreatMetrix solution incorporates visual forensics providing our customers the ability to review, approve, reject, research and<br />
manage their transaction data in the ThreatMetrix system.<br />
The 4 integrated layers of the ThreatMetrix technology are designed to provide customers with a completely passive, tokenized, real-time<br />
system to help them recognize good returning customers and to identify fraudsters.<br />
47