Get informed. Some of these whitepapers come directly from industry experts and research groups. Others were created expressly to help you learn more about ThreatMetrix technology.

The ThreatMetrix Cybercrime Report: Q4 2014
This quarterly report from ThreatMetrix provides a front line view into the global war being waged by cybercriminals. The ThreatMetrix Cybercrime Report is based on actual cybercrime attacks detected by the ThreatMetrix Global Trust Intelligence Network during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. It draws from a sample of close to one billion transactions analyzed by the Network and provides a representative summary of activity from Q3 2014.

ThreatMetrix OFAC Compliance
Criminals and terrorists use sophisticated techniques to hide their true location, and many banks or other businesses can become victims of such location spoofing – thus violating OFAC (Office of Foreign Assets Control) regulations prohibiting business transactions with specific countries, entities, or individuals. Read this whitepaper to learn how organizations can significantly enhance their ability to comply with OFAC regulations by identifying users’ true locations.

Insider Threat Protection
Insider threats have been a major concern among IT security professionals for decades. Password theft and password sharing have been, and continue to be, among the most harmful of these. Fortunately, with the advent of context-based authentication, organizations now have a powerful mechanism to help prevent insider password theft and abuse. This ThreatMetrix whitepaper provides what you’ll need to know to understand the threat and what to do to protect your company’s digital assets.

Fraud Protection for Native Mobile Applications
The use of smartphones, tablets, and other mobile devices to conduct online transactions has rapidly grown into a standard practice. A large percentage of these now-common mobile transactions are completed using mobile apps. Unfortunately, crime associated with their use has increased correspondingly, resulting in a critical need to detect and prevent fraud related to their malicious use. Read this whitepaper to understand how to stop mobile app based fraud.

Real-Time Trust Analytics: Next Generation Cybercrime Protection
As technology has evolved from personal computers to always-connected mobile Internet devices, so too has the perimeter of defense. The first phase of IT security was about securing endpoints, networks, and data residing behind firewalls. The new era of cybersecurity is all about allowing unfettered, yet protected, access to consumer services, business revenues, and productivity assets deployed in the cloud. This ThreatMetrix whitepaper will help you understand why identity is the new perimeter of defense.

Advanced Cybercrime Tactics – Threats translate into crime. How do you stop them?
Cybercrime can’t be ignored – with data breach headlines appearing daily, it’s well known that computer-related fraud and cybercrimes are significant, growing problems. In fact, a recent Ponemon study found that over the past four years, cybercrime-related costs have climbed an average of 78%, averaging a whopping $11.6 million dollars per company studied during 2013. This white paper from ThreatMetrix will provide you the background you need to understand how businesses like yours are being attacked and how to put a stop to it.

Trust Tags – Leveraging Shared Global Trust Intelligence to Enable Frictionless Authentication
Any business with an on-line presence needs to quickly and efficiently detect hackers and fraudsters. For e-commerce and online services, it’s also essential to immediately recognize and establish trust with legitimate buyers and customers. The ThreatMetrix Trust Tags whitepaper is a must read to understand how this technology achieves these objectives by utilizing shared trust intelligence to avoid frustrating the very people you want to feel welcome.

Context-Based Authentication – Enterprises With Sensitive Data or Critical Applications Need to Upgrade Their Authentication Procedures
If your job has anything to do with IT or information security, you probably aren’t sleeping too well lately. Recent studies have shown that the most damaging and expensive cybercrimes all have one thing in common: their perpetrators defeat the organization’s user authentication system. Download this whitepaper to understand why traditional authentication systems don’t work against today’s attacks.

Combating Cybercrime – A Collective Global Approach
Cybercrime is costly for all online businesses and can no longer be ignored. Well-organized cybercriminals operate in powerful networks that allow them to attack thousands of online businesses using an efficient and scalable model. Download this whitepaper to understand how your online business can use global trust intelligence to combat organized cybercriminals.

Five Trends To Track eCommerce Fraud
Discover the most recent trends in online commerce fraud, and how you can leverage the experience of large banks and financial institutions to prevent online fraud at your e-commerce website.
Download Now: English | German

Protecting Against Advances In Web Fraud
Find out what techniques fraudsters are using to hide their tracks and compromise user accounts, and learn how to protect your organization and your customers against these methods.
Download Now: English | German

Real-Time Malware Protection For Financial Institutions
Find out how to detect and stop financial fraud being initiated from desktops, laptops and mobiles devices owned by your good returning customers.
Download Now: English | German

Seven Steps for Crafting an Effective BYOD Policy
Best practices for secure access from unmanaged smartphones, tablets and computers.
Download Now: English | German

Cybercrime Battle Basics – Online Account, Transaction and Malware Protection
Today’s threat environment requires integrated defenses that work beyond network perimeters to protect transactions and identities.
Download Now: English | German | Simplified Chinese

TrustDefender Client – Integrated Endpoint Cybercrime Protection
Learn how to integrate client malware detection with backend transaction and authentication policies.

TrustDefender Mobile – Fraud Screening for Mobile Devices
Embed fraud intelligence into mobile applications for unified fraud prevention and cybercrime defense.

Smart Device Identification for Online Banking
Learn how to use device identification to meet FFIEC guidelines for online banking.

ThreatMetrix Fraud Network Whitepaper
Learn how tapping into a global network of fraud intelligence can give your business an edge in finding and stopping fraud.

How Device Identification Defeats Online Fraud
Offers an overview of how device identification technologies fit into fraud prevention strategies.