ThreatMetrix™ Persona ID Rules now offers real-time linking of a current transaction to related transactions. It’s all done through a matrix of attributes that are associated with the visitor, the device and the connection.
Anomalies in behavior are uncovered in real-time by associating related activity with connected “entities” such as email addresses, transactions, accounts, devices, IP addresses, geo-location, proxies, and physical addresses.
ThreatMetrix Persona ID Rules also makes it possible to use custom fields such as credit cards to create customer-specific user profiles, then score the divergence (anomalies) or convergence (similarities) between current and historical attributes.
In short, ThreatMetrix Persona ID Rules provides a comprehensive view of the threat landscape. Should an identity be stolen and used on a compromised device by a cybercriminal or state-sponsored hacker, ThreatMetrix Persona ID Rules will detect the threat and send an alert.
“Cybercriminals and cyberterrorists are exploiting the fact that many of today’s traditional authentication and verification systems rely largely on breached personal data, which is easily discoverable or self-disclosed on popular social networks,” said Alisdair Faulkner, chief products officer, ThreatMetrix.
In 2012 alone, Yahoo!, eHarmony, Zappos, LinkedIn, Global Payments and a host of others were hit with data breaches. These breaches resulted in hundreds of millions of pieces of personally identifiable information including credit cards, Social Security numbers, passwords, etc. falling into the hands of cybercriminals.
“We circumvent these attacks through the ThreatMetrix™ Global Threat Intelligence Network that is a repository of devices, anonymized identities, transactions and interactions,” added Faulkner.
“We enable our customers to query this repository in real-time to determine whether a transaction is a legitimate customer or actually a cybercriminal hiding behind a spoofed or stolen alias. ThreatMetrix Persona ID Rules helps create a user profile through link analysis of the user’s devices in conjunction with all their related entities and activity over time.”
With the wealth of historical information stored in the ThreatMetrix Global Threat Intelligence Network, which analyzes more than 300 million transactions a month in real-time – and bolstered by the Persona ID Rules – ThreatMetrix customers can now:
• Assess the risk associated with the person or device engaged in an online transaction.
• Examine related transactions and determine whether they have been flagged as high risk in the past.
• Identify a legitimate customer based on whether the device and identity associated has been flagged as low risk in previous transactions.
• Provide a more comprehensive view of a visitor’s identity based on historically related transactions linked to the same identity or device.
• Detect unusual velocities in identities. For example, if transactions coming from an identity are flagged low risk or without any associated historical incidence of fraud, a business can safely screen the transactions in real-time for a frictionless, positive customer experience.
• Determine if a device seen across multiple identities, time zones and geographies is flagged as suspicious, relative to the norm.
“All ThreatMetrix identities collected in the ThreatMetrix Global Threat Intelligence Network are anonymized to enable the sharing of data without compromising or leaking personal data,” said Faulkner. “In comparison to other identity profiling solutions, only ThreatMetrix matches the device – computer, tablet or smartphone – used in a transaction. This gives financial service firms, e-commerce companies, government agencies, enterprises and social media networks confidence that the device used in a transaction has ownership of identities and vice versa.”
ThreatMetrix Persona ID Rules is available for demo at the RSA Conference 2013 in San Francisco at booth 3203.
• ThreatMetrix Blog: “Extending Security Practices to Encompass Evolving Fraud Risks”
• ThreatMetrix Video: “Birds of a Feather: Fraud and Security”