email-square clock-2 date monitor copy-file file folder video cash-square angle-left phone-square id-square edit-square gleam-square check pin like2 target quote-open network-square clock-square flag-square config-square map-marker-square browser-square global-square plug-square pen-square mail-square portfolio-square user-square angle-down-circle users note2 key credit-square credit angle-up-circle gleam user-group id edit phone angle-right close-circle close facebook google-plus linkedin loupe menu twitter youtube user-group-square
Skip to Content
Close

Contact iovation

Start with Recognition.

Every device provides insight into the intentions of the person behind it. Our technology identifies and continues to recognize devices over time without requiring personal information. A device may be new to you but we already know the history of most of the devices connected to your website or mobile app.

86% graph

While a device may be new to you, we already recognize devices in 86% of the 4+ billion transactions we protect annually.

2 Billion graph

iovation has intelligence on over 2 billion global devices and that number grows every day.

.0028% graph

Low risk of unnecessary friction for good customers with 0.0028% false positive rate.

Discover the Backstory.

You need to understand who you’re doing business with—the good and the bad. When you know the facts you make better-informed decisions. Device-based intelligence opens the door to robust layers of information about the past actions of visitors to your site. We flag over 45 types of suspicious behavior.

ACCOUNT INFO DEVICE DEVICE

Uncover Hidden Associations.

A device that initially looks low risk may actually be connected to a number of accounts and other devices with known histories of fraud. Cybercrime rings are highly organized, sophisticated and activities can become related. Our link analysis lets you uncover these otherwise hidden relationships. Gain insight into how devices are related to each other and to your accounts.

Expose the Bad Guys.

Fraudsters like to hide and we know how to find them. iovation's powerful tools let you know when your site visitors use anonymous proxies, emulators or TOR. We also flag risk factors like mismatched times zones, browser language, locations and inconsistent IP addresses.

{image:alt_text}

Tor Network

Disguises a device by moving its traffic across different servers and encrypting it.

{image:alt_text}

Anonymous Proxy

Hides a device’s IP address and corresponding location from the site they’re visiting.

{image:alt_text}

Emulators

Mimics device types and operating systems so that a user can camouflage their device identity.

Don't Fight Fraud Alone.

Benefit from fraud intelligence shared by 3000 fraud analysts all over the world. Receive expert assistance from our highly rated client team. Instantly benefit from this community of professionals, all working together to stop fraud and make the Internet a safer place to do business.

Close

Get a Demo

Take your fraud prevention to the next level.

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×