By Kount, an Equifax Company
How would you rate your experience with Kount?
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Analysis
Enables users to analize documents for audit and dispute purposes
Repository
Provides visibility into deduction invoices and optimizes information retrieval
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Payment monitoring
Monitors both incoming and outgoing payments to detect fraud, such as fake payees, bank accounts, or unathorized users.
Real-time risk monitoring
Reviews every transaction in real‑time using rules, pre-defined criteria or a combination of signals to block, flag, or allow transactions.
Threshold Management
Allows configuring custom rules/thresholds and adjusting sensitivity for different types of transactions.
Identity Verification
Uses documents, biometrics, or device fingerprinting to verify that a user is who they claim to be.
MFA
Detects unusual login or credential usage and requires additional authentication when a risk is present.
Behavioral Analytics
Builds behavioral baselines to detect deviations in transactions and device usage.
Bot Detection
Monitors and blocks automated fraud bots, such as creating fake accounts.
Audit Trail
Tracks actions of users, rule changes, and other system events in secure logs
Reporting
Generates customlizable reports for regulatory requirements and ongoing compliance.