email-square clock-2 cash-square angle-left phone-square id-square edit-square gleam-square check pin like2 target quote-open network-square clock-square flag-square config-square map-marker-square browser-square global-square plug-square pen-square mail-square portfolio-square user-square angle-down-circle users note2 key credit-square credit angle-up-circle gleam user-group id edit phone angle-right close-circle close facebook google-plus linkedin loupe menu twitter youtube user-group-square
Skip to Content
Close

Contact iovation

Fight online fraud with the best.

Online businesses such as CashStar, Expedia, AT&T Performing Arts Center, Aviva Insurance, Cupid Media, Ingo Money, Genting Alderney and Paf speak about why they joined iovation's cybercrime intelligence network and continue to leverage its knowledge base of 2 billion devices and 20 million reports of fraud and abuse to detect and shut down fraudsters on their website and mobile apps.

Download Solutions Brochure

You've got fraud. We have solutions.

Apply our robust device-based fraud prevention services to your online and mobile fraud challenges. Leverage the power of device intelligence and tap into millions of known fraud and abuse events such as chargebacks, identify theft and account takeovers. 

100ms real-time automation

When a customer visits your site, we instantly collect information about the device they are using. We evaluate it for patterns that suggest fraud, and a deny, allow or review recommendation is returned, all in a tenth of a second.

99% uptime

Our distributed SaaS infrastructure supports the largest transaction volumes in the world with an average response time of 100 milliseconds. Our active-active infrastructure means no service interruptions during updates or maintenance.

Identify patterns that indicate fraud.

Establish fraud risk and the need for further transaction review based on suspicious behavior and inconsistent data elements. Device anomalies can help you accurately separate the fraudsters from your good customers.

  • Transactions from TOR
  • Geolocation and IP address mismatches
  • High-risk locations, IPs, and ISPs
  • Time zone mismatches
  • Proxy use
  • Velocity risks like multiple new devices per account
  • Shipping location and credit card mismatches
  • Jailbroken or rooted mobile devices

Stay ahead of threats with transaction insights.

By combining device-based risk assessments with your transaction-specific information like purchase amount, SKU, email address or phone number, you can better pinpoint fraud. After adding transaction details to your current API calls, you can set up real-time business rules in order to act on this data. Get answers to questions such as:

credit card icon

Which accounts have used more than two credit cards in the last 24 hours?

mail icon

Is the email address used in a credit application coming from a risky domain?

email icon

Is an applicant using multiple email addresses from the same computer?

phone icon

Has the phone number for the account been used with more than three devices?

pen icon

Which accounts have applied for more than $1,000 in credit in the last day?

cash icon

Have any devices spent more than $1,200 in the last 12 hours?

Writing screen resolution and time zone specific businesses rules helped us identity a developer writing 200+ fake reviews and another writing 6,000 fake reviews for another site.

JT Buser Bazaarvoice
business rules screenshot

Streamline your review process with unique Business Rules.

Quickly thwart attacks with customizable business rules. Once a high-risk behavior is identified, your custom business rules will flag the transaction. Rules can be easily added, adjusted or deleted on the fly, with immediate impact. Our rule sets can be created for any customer touch point—including login, account creation, funds transfer and checkout. Your integration team and dedicated client managers will help you fine-tune each business rule for your specific needs.

  • Evidence

    Identifies risky devices already associated with fraud and abuse at other businesses.

  • Geolocation

    Gets users actual location with Real IP, reveal unauthorized countries, TOR use and more.

  • Velocity

    Set thresholds such as too many transactions or multiple devices accessing account.

  • Watch List

    Create your own custom-built positive or negative lists based on your specific needs.

  • Risk Profile

    Indicates when a device has characteristics similar to other groups of risky devices.

  • Age-Based

    Shows the amount of history that you have with a paired account and device.

  • Anomaly

    Reveals when the device has risky characteristics or is trying to evade detection.

  • Compound

    Combine multiple rules to expand use cases and pinpoint specific fraud behavior.

Business rules favored by iovation clients

Fraud professionals discuss where they get the most value from iovation’s risk service. With multiple categories of business rules to chose from, global clients share how they best leverage them. In many cases, it’s testing out new situations by turning on rules and setting the values to zero. Then they can see how many hits they have received and assess the thresholds that are the best fit for their company, risk tolerance and size of team.

View Retail Case Study

Get timely reporting about transaction activity.

In addition to running ad-hoc reports in the administration console, each day our clients receive a Digest of Suspicious Activity, a highly configurable report that displays all transactions that meet any of your configured conditions or triggers. Clients also receive a Transaction Activity report for the month (including transaction result) and a weekly Weighted Business Rules report. This report displays all transactions that come in during the reporting period that matched at least one rule.

daily calendar icon

The Digest of Suspicious Activity combines several key data elements into one report for a comprehensive view of all recent transactions that may warrant review.

weekly calendar icon

The Weighted Business Rule Detail Report displays details for all transactions that came in during the reporting period that matched at least one rule.

monthly calendar icon

The Transaction Activity Report displays a total of all billable transactions sent to iovation during the month and broken down by transaction result.

Ready to get started?

See how our device-based fraud prevention service stops fraud in its tracks.

Contact Us
Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×