Authorize.net Features
Payment Options (8)
-
Coupons, Discounts, Promotions, and Gift Cards
Ability to accept coupons, discounts, promotions, and gift cards.
-
Recurring Billing
Ability to charge customers on a recurring basis for subscription-based purchases
-
Instant Payment
Customer data is securely stored so there is no need to repeatedly enter data for multiple purchases
-
Accepted Credit Cards and Debit Cards
Ability to accept different types of credit and debit cards
-
ACH Payments and eCheck Processing
Ability to accept and process eChecks and ACH payments as a form of payment
-
Real-Time Payments
Supports real time payments
-
Multi-Currency
Allows users to process payments in multiple currencies.
-
Online payment portal
Provides an online portal where customers can make payments.
Administration (7)
-
Reporting/Dashboards
Access pre-built and custom reports and dashboards.
-
User, Role, and Access Management
Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.
-
Payout Time
Turnaround time for money to be transferred to the merchant's bank account
-
Manual Payment Entry
Web form that the merchant can use to enter credit card payments manually (from over the phone, mail, etc) and issue returns or void previous transactions
-
Dispute Resolution
The process for handling chargebacks and disputes with the payment gateway.
-
Omnichannel
Process payments from multiple channels such as ACH, mobile, or e-commerce.
-
Levels 1 & 2
Supports levels 1 and 2 for credit card payment processing.
Security (4)
-
PCI Compliance
Ensures that the service is building and maintaining a secure network; protecting cardholder data; maintaining a vulnerability management program; implementing strong access control measures; regularly monitoring and testing networks; and maintaining an information security policy
-
Fraud Protection Tools
Fraud protection filters such as high risk countries, email service provider risk, high risk BIN, account number velocity, high item number, shipping/billing mismatch, AVS failure, CSC failure, and others
-
Data Tokenization
Sensitive data (personal info, CC info, etc) is replaced with non-sensitive equivalent, aka a Token. The tokens act as a reference that maps back to the sensitive data through a tokenization system.
-
Two-Factor Authentication
An additional layer of security to prevent fraudulent activity (such as creating an account and verifying an email address and cell phone number)
Development (4)
-
Customization (Fields, Objects, and Layouts)
Allows developers to customize payment form to accommodate their unique processes.
-
APIs
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc with other software applications.
-
Accounting Software Integration
Provides standard integration with merchant's accounting software
-
E-Commerce Software Integration
Provides standard integration with merchant's e-commerce software
Platform (6)
-
Performance and Reliability
Payment gateway is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the gateway to respond to an action they took. System scales with load.
-
API / Integrations
Application Programming Interface—Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
-
PCI Regulation Compliance
Complies with payment card industry (PCI) regulations
-
Supplemental Technology
Supports EMV chip card and Near Field Communications (NFC) technologies
-
Accounting integration
Provide integration with accounting software and ERP systems.
-
E-commerce Integration
Provide integration with B2B and B2C e-commerce platforms
Intelligence (4)
-
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
-
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Detection (3)
-
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
-
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
-
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Response (4)
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Billing (4)
-
Automation
Ability to create and send invoices automatically at predefined or custom frequencies.
-
Consolidation
Consolidate invoices so customers can make one payment for multiple bills.
-
Adjustments
Adjust invoices to handle exceptions and correct errors.
-
Blacklisting
Allows users to temporarily or permanently block potential fraudsters.
Dunning (3)
-
Collections
Assists users in collecting payments for unpaid invoices.
-
Dispute Management
Manages disputes regarding billing and payments.
-
Escalation
Define escalation processes to suspend service for unpaid invoices.
Performance (3)
-
Packages
Track the financial performance of various types of packages.
-
Discounts
Identify the impact of special pricing and discounts on revenue.
-
Plan Changes
Monitor plan changes such as upgrades and downgrades, or cancellations.
Reporting (3)
-
Dimensions
Reports revenue based on various dimensions, such as subscription segments, geographies, or discounts
-
Deferred Revenue
Tracks revenue for goods or services that have yet to be collected
-
Revenue Recognition
Accurately determines and reports the accounting period when revenues are recognized
Agentic AI - Payment Gateways (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Subscription Billing (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Technology Glossary Features
View definitions of the features and discover new technology terms.
Dispute resolution resolves conflicts using negotiation, mediation, arbitration, or litigation for faster, cost-effective, and flexible outcomes.
Payment card industry (PCI) compliance plays a crucial role in data security. Learn more about PCI compliance, how it helps businesses keep credit card data secure, and helpful information on PCI compliance benefits and best practices.
Online payments are the exchange of monetary funds between buyers and sellers via the internet. This software feature helps perform a majority of purchases and sales conducted on the internet.





