By Kount, an Equifax Company
How would you rate your experience with Kount?
Transaction Scoring
Based on 77 Kount reviews and verified by the G2 Product R&D team.
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Based on 76 Kount reviews and verified by the G2 Product R&D team.
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Based on 75 Kount reviews and verified by the G2 Product R&D team.
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Based on 72 Kount reviews and verified by the G2 Product R&D team.
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Fraud Detection
Based on 79 Kount reviews and verified by the G2 Product R&D team.
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Based on 73 Kount reviews and verified by the G2 Product R&D team.
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Payment Verification
This feature was mentioned in 65 Kount reviews.
Requires verification of credit card, debit card, and money transfers prior to accepting payments
This feature was mentioned in 70 Kount reviews.
66 reviewers of Kount have provided feedback on this feature.
Device Tracking
Based on 80 Kount reviews and verified by the G2 Product R&D team.
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Based on 32 Kount reviews.
Monitors for and rids systems of bots suspected of committing fraud.
As reported in 64 Kount reviews.
Based on 64 Kount reviews.
Incident Reports
60 reviewers of Kount have provided feedback on this feature.
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Based on 68 Kount reviews.
As reported in 69 Kount reviews.
As reported in 70 Kount reviews.
Bi-Directional Identity Synchronization
This feature was mentioned in 15 Kount reviews.
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
This feature was mentioned in 19 Kount reviews.
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
13 reviewers of Kount have provided feedback on this feature.
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Analysis
Enables users to analize documents for audit and dispute purposes
Repository
Provides visibility into deduction invoices and optimizes information retrieval
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Payment monitoring
Monitors both incoming and outgoing payments to detect fraud, such as fake payees, bank accounts, or unathorized users.
Real-time risk monitoring
Reviews every transaction in real‑time using rules, pre-defined criteria or a combination of signals to block, flag, or allow transactions.
Threshold Management
Allows configuring custom rules/thresholds and adjusting sensitivity for different types of transactions.
Identity Verification
Uses documents, biometrics, or device fingerprinting to verify that a user is who they claim to be.
MFA
Detects unusual login or credential usage and requires additional authentication when a risk is present.
Behavioral Analytics
Builds behavioral baselines to detect deviations in transactions and device usage.
Bot Detection
Monitors and blocks automated fraud bots, such as creating fake accounts.
Audit Trail
Tracks actions of users, rule changes, and other system events in secure logs
Reporting
Generates customlizable reports for regulatory requirements and ongoing compliance.