By Arkose Labs
How would you rate your experience with Arkose Labs?
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Bot Mitigation
15 reviewers of Arkose Labs have provided feedback on this feature.
Monitors for and rids systems of bots suspected of committing fraud.
This feature was mentioned in 12 Arkose Labs reviews.
Based on 12 Arkose Labs reviews.
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Based on 11 Arkose Labs reviews.
11 reviewers of Arkose Labs have provided feedback on this feature.
Incident Reports
Based on 13 Arkose Labs reviews.
Produces reports detailing trends and vulnerabilities related to payments and fraud.
As reported in 12 Arkose Labs reviews.
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Payment monitoring
Monitors both incoming and outgoing payments to detect fraud, such as fake payees, bank accounts, or unathorized users.
Real-time risk monitoring
Reviews every transaction in real‑time using rules, pre-defined criteria or a combination of signals to block, flag, or allow transactions.
Threshold Management
Allows configuring custom rules/thresholds and adjusting sensitivity for different types of transactions.
Identity Verification
Uses documents, biometrics, or device fingerprinting to verify that a user is who they claim to be.
MFA
Detects unusual login or credential usage and requires additional authentication when a risk is present.
Behavioral Analytics
Builds behavioral baselines to detect deviations in transactions and device usage.
Bot Detection
Monitors and blocks automated fraud bots, such as creating fake accounts.
Audit Trail
Tracks actions of users, rule changes, and other system events in secure logs
Reporting
Generates customlizable reports for regulatory requirements and ongoing compliance.