Get informed. Some of these whitepapers come directly from industry experts and research groups. Others were created expressly to help you learn more about ThreatMetrix technology.

Fraud Protection for Native Mobile Applications
The use of smartphones, tablets, and other mobile devices to conduct online transactions has rapidly grown into a standard practice. A large percentage of these now-common mobile transactions are completed using mobile apps. Unfortunately, crime associated with their use has increased correspondingly, resulting in a critical need to detect and prevent fraud related to their malicious use. Read this whitepaper to understand how to stop mobile app based fraud.

Real-Time Trust Analytics: Next Generation Cybercrime Protection
As technology has evolved from personal computers to always-connected mobile Internet devices, so too has the perimeter of defense. The first phase of IT security was about securing endpoints, networks, and data residing behind firewalls. The new era of cybersecurity is all about allowing unfettered, yet protected, access to consumer services, business revenues, and productivity assets deployed in the cloud. This ThreatMetrix whitepaper will help you understand why identity is the new perimeter of defense.

Advanced Cybercrime Tactics – Threats translate into crime. How do you stop them?
Cybercrime can’t be ignored – with data breach headlines appearing daily, it’s well known that computer-related fraud and cybercrimes are significant, growing problems. In fact, a recent Ponemon study found that over the past four years, cybercrime-related costs have climbed an average of 78%, averaging a whopping $11.6 million dollars per company studied during 2013. This white paper from ThreatMetrix will provide you the background you need to understand how businesses like yours are being attacked and how to put a stop to it.

Trust Tags – Leveraging Shared Global Trust Intelligence to Enable Frictionless Authentication
Any business with an on-line presence needs to quickly and efficiently detect hackers and fraudsters. For e-commerce and online services, it’s also essential to immediately recognize and establish trust with legitimate buyers and customers. The ThreatMetrix Trust Tags whitepaper is a must read to understand how this technology achieves these objectives by utilizing shared trust intelligence to avoid frustrating the very people you want to feel welcome.

Context-Based Authentication – Enterprises With Sensitive Data or Critical Applications Need to Upgrade Their Authentication Procedures
If your job has anything to do with IT or information security, you probably aren’t sleeping too well lately. Recent studies have shown that the most damaging and expensive cybercrimes all have one thing in common: their perpetrators defeat the organization’s user authentication system. Download this whitepaper to understand why traditional authentication systems don’t work against today’s attacks.

Combating Cybercrime – A Collective Global Approach
Cybercrime is costly for all online businesses and can no longer be ignored. Well-organized cybercriminals operate in powerful networks that allow them to attack thousands of online businesses using an efficient and scalable model. Download this whitepaper to understand how your online business can use global trust intelligence to combat organized cybercriminals.

Five Trends To Track eCommerce Fraud
Discover the most recent trends in online commerce fraud, and how you can leverage the experience of large banks and financial institutions to prevent online fraud at your e-commerce website.
Download Now: English | German

IT Security and Online Fraud Prevention White Paper
Tech Research Group conducted a study on the level of security planning pursued by organizations, which focused on the adoption of IT security and online fraud prevention solutions that address multiple areas of risk.

Protecting Against Advances In Web Fraud
Find out what techniques fraudsters are using to hide their tracks and compromise user accounts, and learn how to protect your organization and your customers against these methods.
Download Now: English | German

Real-Time Malware Protection For Financial Institutions
Find out how to detect and stop financial fraud being initiated from desktops, laptops and mobiles devices owned by your good returning customers.
Download Now: English | German

Seven Steps for Crafting an Effective BYOD Policy
Best practices for secure access from unmanaged smartphones, tablets and computers.
Download Now: English | German

Meeting FFIEC Guidance in Financial Institutions
Learn how unified device identification and malware protection help meet FFIEC authentication guidance.

Cybercrime Battle Basics – Online Account, Transaction and Malware Protection
Today’s threat environment requires integrated defenses that work beyond network perimeters to protect transactions and identities.
Download Now: English | German

TrustDefender Client – Integrated Endpoint Cybercrime Protection
Learn how to integrate client malware detection with backend transaction and authentication policies.

TrustDefender Mobile – Fraud Screening for Mobile Devices
Embed fraud intelligence into mobile applications for unified fraud prevention and cybercrime defense.

TrustDefender ID – Risk-based Digital Identity Verification
Learn how advanced device identification creates a cost-effective first line of defense against fraud.

Aite Group: Know Your Enemy: Successful Online Fraud Mitigation Strategies
The independent research/advisory firm Aite Group profiles the online fraud landscape and U.S. FFIEC guidance for fraud mitigation.

2011 Ponemon Institute/ThreatMetrix Study on Consumers’ Reaction to Mobile Payments and Online Shopping
The Ponemon Institute study into US consumers’ online shopping reveals strong adoption coupled with concern about fraud.

2011 Ponemon Institute/ThreatMetrix Study on Consumers’ Reaction to Mobile Payments and Online Shopping: Baby Boomers Versus Millennials Supplement
This research examines the Baby Boomer and Millennial generations’ attitudes and concerns about mobile payments and online shopping.

2011 Consumers’ Reaction to Fraud Ponemon Institute/ThreatMetrix Study
This study by the Ponemon Institute study reveals the depth of consumer concerns about online fraud.

Smart Device Identification for Online Banking
Learn how to use device identification to meet FFIEC guidelines for online banking.

ThreatMetrix Fraud Network Whitepaper
Learn how tapping into a global network of fraud intelligence can give your business an edge in finding and stopping fraud.

Authenticating Customers to Stop Online Banking Fraud
Supplementing positive identification with negative identity verification is essential to preventing online banking fraud.

How Device Identification Defeats Online Fraud
Offers an overview of how device identification technologies fit into fraud prevention strategies.