Provides a one-time passcode (OTP) via voice-call.
Biometric Factor
Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.
Mobile-Push
Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Risk-Based Authentication
Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.
Functionality (5)
Backup
Offers encrypted backup recovery stored by the vendor.
FIDO2-compliant
Offers FIDO2-enabled authentication method
Works with hardware security keys
Works with hardware security keys
Multiple authentication methods
Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others.
Offline or no-phone solution
Offers solutions when users are offline or do not have access to a mobile phone.
Intelligence (4)
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Detection (6)
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Response (2)
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Analysis (2)
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (1)
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Implementation (3)
Easy Setup
Offers an easy to understand user interface to make setup smooth.
Mobile SDK
Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.
Web SDK
Offers a software development kit (SDK) for web-based applications.
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.