DataDome Features
Detection (4)
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Analysis (3)
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (3)
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
Prevents previous committers of fraud from future transactions.
Management (4)
IT Alerting
Send summary, update, or actionable alerts to administrators to detail activity.
Network Capacity
Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.
Logging
Information on each incident is stored in databases for user reference and analytics.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Protection (2)
Website Protection
Detect and protect against attacks targeting websites.
Infrastructure Protection
Detect and protect against attacks targeting on-premise or locally controlled infrastructure.
Resolution (5)
Attack Mitigation
Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions.
Network Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Security Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Resolution Automation
Diagnoses and resolves incidents without the need for human interaction.
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives






