Flags suspicious transactions and either alerts administrators or declines transaction.
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Rates each transaction's risk based on specific factors and their benchmarked scores.
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts administrators when fraud is suspected or transactions have been declined.
Constantly monitors system to detect anomalies in real time.
Tags users suspected of committing fraud and identifies them upon return.
Prevents previous committers of fraud from future transactions.
Monitors for and rids systems of bots suspected of committing fraud.
Keeps records of geographic location and IP addresses of fraud suspects.