Fight online fraud with the best.
Online businesses such as CashStar, Expedia, AT&T Performing Arts Center, Aviva Insurance, Cupid Media, Ingo Money, Genting Alderney and Paf speak about why they joined iovation's cybercrime intelligence network and continue to leverage its knowledge base of 2 billion devices and 20 million reports of fraud and abuse to detect and shut down fraudsters on their website and mobile apps.Download Solutions Brochure
You've got fraud. We have solutions.
Apply our robust device-based fraud prevention services to your online and mobile fraud challenges. Leverage the power of device intelligence and tap into millions of known fraud and abuse events such as chargebacks, identify theft and account takeovers.
Identify patterns that indicate fraud.
Establish fraud risk and the need for further transaction review based on suspicious behavior and inconsistent data elements. Device anomalies can help you accurately separate the fraudsters from your good customers.
- Transactions from TOR
- Geolocation and IP address mismatches
- High-risk locations, IPs, and ISPs
- Time zone mismatches
- Proxy use
- Velocity risks like multiple new devices per account
- Shipping location and credit card mismatches
- Jailbroken or rooted mobile devices
Stay ahead of threats with transaction insights.
By combining device-based risk assessments with your transaction-specific information like purchase amount, SKU, email address or phone number, you can better pinpoint fraud. After adding transaction details to your current API calls, you can set up real-time business rules in order to act on this data. Get answers to questions such as:
Writing screen resolution and time zone specific businesses rules helped us identity a developer writing 200+ fake reviews and another writing 6,000 fake reviews for another site.JT Buser Bazaarvoice
Streamline your review process with unique Business Rules.
Quickly thwart attacks with customizable business rules. Once a high-risk behavior is identified, your custom business rules will flag the transaction. Rules can be easily added, adjusted or deleted on the fly, with immediate impact. Our rule sets can be created for any customer touch point—including login, account creation, funds transfer and checkout. Your integration team and dedicated client managers will help you fine-tune each business rule for your specific needs.
Identifies risky devices already associated with fraud and abuse at other businesses.
Gets users actual location with Real IP, reveal unauthorized countries, TOR use and more.
Set thresholds such as too many transactions or multiple devices accessing account.
Create your own custom-built positive or negative lists based on your specific needs.
Indicates when a device has characteristics similar to other groups of risky devices.
Shows the amount of history that you have with a paired account and device.
Reveals when the device has risky characteristics or is trying to evade detection.
Combine multiple rules to expand use cases and pinpoint specific fraud behavior.
Business rules favored by iovation clients
Fraud professionals discuss where they get the most value from iovation’s risk service. With multiple categories of business rules to chose from, global clients share how they best leverage them. In many cases, it’s testing out new situations by turning on rules and setting the values to zero. Then they can see how many hits they have received and assess the thresholds that are the best fit for their company, risk tolerance and size of team.View Retail Case Study
Get timely reporting about transaction activity.
In addition to running ad-hoc reports in the administration console, each day our clients receive a Digest of Suspicious Activity, a highly configurable report that displays all transactions that meet any of your configured conditions or triggers. Clients also receive a Transaction Activity report for the month (including transaction result) and a weekly Weighted Business Rules report. This report displays all transactions that come in during the reporting period that matched at least one rule.
Ready to get started?
See how our device-based fraud prevention service stops fraud in its tracks.