February 16, 2018
February 15, 2018
February 12, 2018
Verifying True Identity in a Post-Breach World
Digital transactions are inherently anonymous. So how can businesses really trust that people are who they say they are? Following numerous high profile breaches, full “identities” can be pieced together from myriad pieces of personal information readily available on the dark web. Fraudsters and legitimate customers appear exactly alike to an unwitting merchant.
Static Identity Assessment Cannot Work Alone
In the past, organizations relied on static identity verification methods to compare the information they see to what external bureaus knew about users. However, as more identities have been breached, static information alone becomes ineffective. With so much static identity data available to fraudsters, it’s often easy for them to pass basic identity checks.
Static Identity Verification Can Miss Fraudster and Block Legitimate Customers
Organizations need a more holistic, layered approach to bridge the gap between online identities and the people behind them. They need a way to augment static identity information with dynamic, shared intelligence in order to verify a user’s true identity.
A Dynamic Approach to Differentiating Fraudsters From Trusted Users
ThreatMetrix Digital Identity Network fills this gap by leveraging shared intelligence from millions of daily consumer interactions. ThreatMetrix stitches together a customer’s true digital identity by analyzing the critical connections between devices, locations and anonymized personal information. By combining this unique, anonymized digital identity with static identity data, organizations gain a far more accurate risk profile of every user. What’s more, dynamic identity assessment continuously evaluates digital identities in the context of every transaction, correlating seemingly disconnected incidents in real time.
The Challenge of Augmenting Dynamic Identity Assessments With Static Identity Data
The static identity provider market is highly fragmented, with multiple vendors providing various static data elements and varying degrees of coverage. The level of data quality varies greatly by data type and across regions based on regulations and restrictions on data access. For example, some vendors focus exclusively on email, some on phone numbers, and others on social data. The response rate on data queries also varies considerably, leading to degraded customer service levels for transactions that rely on this data for evaluation. In addition, many of these static identity checks have poor global coverage. In the U.S. alone, many Americans have no credit score, or have what is known as a thin file, which translates to an untrusted credit score. Less than half of the world’s population has a credit score at all.
The key to leveraging static identity data is to utilize a real-time decisioning platform that recognizes specifically which data is appropriate by use case (new account origination, payments, etc.). The platform can then orchestrate the proper workflow by selecting the appropriate data provider based on geography, desired response rate, pricing and other considerations.
How ThreatMetrix Solves the Challenge
ThreatMetrix facilitates stronger, smarter, faster fraud decisions and the ability to take clear, decisive action in real time. Not only does the solution reduce fraud losses, it also helps verify up to 95 percent of returning customers, mitigate risk, reduce operational friction, and streamline transaction processing.