New Provider Template

[Selections made by providing an X or specified content]

[Use hyperlinks to connect to definitions]

SORTING CRITERIA:

1. Industry

[What industry does your solution serve/protect? Please Select One or More.]

E-Commerce
Financial Services
Insurance
Telecommunications
Healthcare

2. Core Functionality

[What is the primary function of your solution? Some providers fit into more than one category. Please select the one that best aligns with your solution. There will be an opportunity to select a supplemental functionality below. Please Select One.]

Platform & Decision Engine
Identity & Authentication
Identity & Data Verification
Chargeback Management
Network & Alerts
KYC & AML

3. Supplemental Functionality

[What is a supplemental function of your solution? Not all providers have one. If you do, Please Select One.]

Platform & Decision Engine
Identity & Authentication
Identity & Data Verification
Chargeback Management
Network & Alerts
KYC & AML

4. Vertical Coverage

[If you protect merchants, what verticals does your solution cover? Please Select One or More, or N/A]

Electronics
Jewelry
Apparel
Sporting Goods
Cosmetics
Home Improvement
Ticketing & Events
Travel
Gaming
Marketplaces & Communities
Digital Goods
Gift Cards
N/A

5. Fraud & Abuse Coverage

[What types of fraud does your solution address? Please Select One or More.]

Payment Fraud
Account Takeover
New Account Fraud
Identity Fraud
Synthetic Identity Fraud
Promo Abuse
Loyalty Abuse
Content Abuse
Reseller Abuse
Call Center Fraud

6. Technology & Data

[What technology/data does your solution include? Please Select One or More.]

Biometrics
Behavioral Analytics
Machine Learning
Rules Engine
Device Identification
IP & Geolocation
Identity Data at Scale

7. Value Added Features

[What additional value added features does your solution include? Please Select One or More?]

*Testing*
Try Before Buy
Sandbox Solution Testing
Demo Testing
*Capabilities*
3rd Party API Capabilities
Pre-Authorization Risking
Payment Gateway Capabilities
Sandbox Rule Testing
Mobile SDK
*Consultation & Assurance*
Managed Services
Chargeback Guarantee

SUMMARY PROFILE INFORMATION:

1. Company Name

2. Company URL

3. LinkedIn URL

4. Company Founded (Year)

5. Headquarter City

6. Headquarter Country

7. Solution Summary
[Max. 50 words. A concise and specific explanation of the value you provide your target market. This is your chance to catch potential client’s attention. Be concise, but impactful.]

MAIN PROFILE INFORMATION:

[We will provide a summary of the Sorted Criteria in the Main Profile. This allows the user to see a consolidated list of what they sorted by and have a complete view of what your solution was a match for while navigating the Main Profile.]

1. Customers

[Customers you are proud to say use your solution. Include URL for customer home page. Max 5]

Customer / URL

2. Customer Testimonials/Case Studies

[Customers who said they are proud to use your solution. Include Customer, Title and URL for testimonial/case study. Also, include corresponding KPI number (see next section regarding KPI’s) Max 10 testimonials]

Customer / Content Title / URL / KPI

3. Key Performance Indicators

[The below pool of KPI’s are listed with a corresponding number. As you list the testimonials/case studies above, please include the KPI numbers that are proven in each testimonial or study. Note: will not display as numbers in profile, but saves time and space when filling out template]

1. Fraud Loss Reduction
2. Improve Conversions
3. Frictionless Experience
4. Preserve Brand Equity
5. Manual Review Optimization
6. Efficient Automation
7. Real Time Decisions
8. Reduce Staffing Costs
9. Reduce Operational Costs
10. Improve Scalability
11. Quick & Simple Integration

4. Content

[This is referring to the broader page, with all your content. Include URL for provider page that houses this content. Do not provide links to specific content.]

URL

5. Integrations

[Referring to external companies. Broad range. Anything you deem a high value integration that adds significant value to your solution (ie: data providers, frontend webstores, other fraud solutions, etc). Please provide company name along with URL to company homepage]

Company Name / Integration Type / URL

6. Corporate Information & Funding

[We will provide link to Crunchbase]

7. Solution Details

[Max 500 words, Target 400-500 words. A longer form explanation of the value your solution provides. Please do not copy and paste from your company website. Provide original content that will draw the user in and best position your core value proposition. How do you solve your client’s problems and differentiate from the competition?]

DEFINITION APPENDIX:

Provider Functionality

Platform & Decision Engine

These solutions offer a fraud prevention platform that can manage fraud at various touch points, producing risk decisions and/or scores. Rules engines and/or machine learning are at the heart of these solutions, deployed with varying methodologies. While the core functionality is the same, these solutions can vary greatly in technology, fraud/vertical coverage and other distinguishing features.

Identity & Authentication

These solutions sit at the authentication stage of the fraud continuum, focusing on verifying digital identities and mitigating identity and account fraud. While also incorporated in some platform & decisions engines, these solutions are known for utilizing behavioral analytics, biometrics and device identification to authenticate users and protect accounts. These approaches and practices often roll up into higher level methodologies like multi-factor authentication (MFA) and risk-based authentication (RBA).

Identity & Data Verification

These solutions also verify digital identities, but their core functionality is leveraging identity data at scale. Whether via API calls or web tools, these solutions verify numerous identity attributes to help businesses confirm legitimate customers at various touchpoints.

Chargeback Management

These solutions are dedicated to investigating and winning chargeback disputes through in-depth research and domain expertise. While some solutions manage chargebacks, these solutions differentiate with a dedicated focus on this layer of fraud management.

Network & Alerts

Secure networks and alerts between industry stakeholders to identify and prevent fraudulent transactions, outside of the traditional payment network.

KYC & AML

Verifying the digital identities of your customers in order to comply with regulatory mandates. Anti-Money Laundering (AML) is the largest use case for verifying identities in this capacity, commonly referred to as Know Your Customer (KYC).

Fraud & Abuse Types

Payment Fraud

Illegal or fraudulent purchase of goods and/or services. Traditionally, these transactions are executed with compromised payment information, including credit cards or alternative payment methods.

Account Takeover

Unauthorized access to a user’s account in order to steal identity credentials, make a fraudulent purchase or engage in varying types of abuse.

New Account Fraud

Unauthorized setup/access to a new account in order to make fraudulent purchases or engage in varying types of abuse.

Identity Fraud

Unauthorized use of personal identity data to deceive and/or defraud another individual.

Synthetic Identity Fraud

Unauthorized use of real identity data, often different pieces from different individuals, in combination with fake identity data to create a fabricated identity.

Promo Abuse

Abuse of promotional offers by circumventing conditions/rules in order obtain significant discounts.

Loyalty Abuse

Abuse of loyalty points to obtain significant discounts or sell stolen loyalty points. This abuse can include account takeover as a means of stealing loyalty points.

Content Abuse

Abusive or malicious user-generated content. This abuse can include account takeover and/or new account fraud. Spam falls under this layer of content abuse.

Reseller Abuse

Abuse of purchasing quantities in an effort to resell product for a profit. While reselling is a common practice, abuse can damage a client’s brand and/or deplete product availability for other customers.

Call Center Fraud

Exploiting call centers as a channel in which to launch fraud attacks, spanning varying forms of fraud and abuse.

Technology & Data

Biometrics

The use of distinctive, measurable physiological characteristics to verify an individual’s identity. Physical biometric analysis includes techniques such as retinal scans, fingerprints and voice prints. Passive biometrics use behavioral data to authenticate, identifying anomalies to develop behavioral risk profiles. While subtle differences, passive biometrics are similar to behavioral analytics.

Behavioral Analytics

The analysis of behavioral traits, signals and patterns as individuals interact with various devices online. Anomaly detection and atypical behavior help understand high risk behavior and verify digital identities.

Machine Learning

A subset of artificial intelligence, machine learning has the capacity to learn over time without being explicitly programmed. It can ingest a large amount of data and detect patterns and anomalies at scale. Machine learning models are trained to make risk decisions and/or generate a risk scores. For now, we are including supervised and unsupervised machine learning under the same category.

Rules Engine

Fraud rules are algorithms that use specific attributes and parameters. A Rules engine allows for the creation and management of these fraud rules in order to make risk decisions and/or generate a risk score. While not self-learning in nature, rules engines enable analysts to test, modify and improve rule performance.

Device Identification

Identifying and tracking device activity by capturing and evaluating multiple device signals, commonly referred to as a fingerprint or DI print. Device registration and networks of coordinated device intelligence also assist in identifying and understanding device behavior.

IP & Geolocation

The utilization of an IP address, along with other device signals, to determine location and assess matches. Proxy detection rolls up into this broader category.

Identity Data at Scale

The cultivation and utilization of massive amounts of identity data to verify digital identities. This can be done through API calls, web tools or integrations into workflows and data models.

Provider - Value Added Features

Try Before Buy

Ability to test solution features, functionality and performance before committing to a contract with the fraud solution provider.

Sandbox Solution Testing

Ability to pass data into a non-production environment in order to test integration and other synergies.

Demo Testing

Lens into the products, features and functionality without passing actual data.

3rd Party API Capabilities

Ability to send API calls to third party vendors.

Pre-Authorization Risking

Capability to provide risking functionality before payment authorization.

Payment Gateway Capabilities

Offers payment processing capability directly through their platform.

Sandbox Rule Testing

Testing of rules against historical data in non-production environment, helping to tune rule performance.

Mobile SDK

Software Development Kit available for Android, iOS and Windows

Managed Services

Professional services offered as a paid ad on, with a dedicated team and/or resource. Common services are manual review, chargeback management and risk management.

Chargeback Guarantee

Provider absolves client of chargeback liability, covering 100% of fraud losses.