image description

Getting Started with ThreatMetrix

Add our expertise to your team

Introduction

ThreatMetrix Professional Services team works closely with our customers to understand business goals, evaluate security infrastructure and then rapidly implement our digital identity solutions.

Once implemented, we provide ongoing services to continuously and dynamically optimize, personalize and adapt to changing business needs and cyber threats.

image description

Risk Systems Consulting

Understanding the full nature of your fraud and authentication challenges is a critical first step in our customer engagement process. Using our proven assessment methodology, we work hand in hand to assess... Show More

Understanding the full nature of your fraud and authentication challenges is a critical first step in our customer engagement process. Using our proven assessment methodology, we work hand in hand to assess systems, the underlying technology stack and staffing profile. Our experts establish and analyze known security issues and perform a variety of custom security, fraud prevention and forensic analysis to root out any threats you may not have yet discovered.

Goals & Objectives

We meet key stakeholders to identify organizational objectives and ensure proper alignment. We’ll help you define key performance indicators and success criteria for tracking and documenting the success of your implementation. Then, our project enablement team staffed by engineers and consultants partner with you to form the enablement team.

Analysis and Recommendations

With an assessment complete, KPIs established, and an enablement team identified, we provide a full analysis on the elements required to architect a solution that meets your needs.

Show Less
image description

Design and Planning

Our project enablement team establishes workflow and recommendations for implementing your ThreatMetrix architecture and using its capabilities to the fullest... Show More

Our project enablement team establishes workflow and recommendations for implementing your ThreatMetrix architecture and using its capabilities to the fullest in your efforts to enhance your organization’s digital revenue, efficiency and security objectives. It is at this stage that we can help you determine if your solution will be 100% managed internally, or through some hybrid or fully outsourced scenario.

Integration Mapping

As part of your solution architecture, we scope any required integration points, from legacy systems to third party data sources. Thanks to its open, cloud-based platform, ThreatMetrix is unique in its ability to enable a unified decision framework for taking faster, smarter actions to streamline the user experience while offering the best protection against fraud and other threats. Integration mapping helps you utilize the full capabilities of your deployment.

Project Management and Review

Best of all, our Professional Services team is there to ensure your deployment hits your established timelines and performance targets. A dedicated Technical Account Manager (TAM) will provide you with a comprehensive project plan with major milestones for implementation, testing and approval processes—and will manage the entire process as your proposed architecture is fully implemented.

Show Less
image description

Systems Modeling

Using the ThreatMetrix Digital Identity Network® containing billions of transactions from thousands of websites across the globe, we configure our system to analyze your transactions and establish user personas of known... Show More

Using the ThreatMetrix Digital Identity Network® containing billions of transactions from thousands of websites across the globe, we configure our system to analyze your transactions and establish user personas of known fraudsters and trusted customers. Our advanced machine learning identifies patterns of trust or risk associated with these personas by scoring them against past behavior and device usage on a global basis and in real time.

Business Policy Definitions

Using the ThreatMetrix portal, our enablement team can help you set business rules or “trust thresholds” configured to evaluate acceptable user behavior and assess the risk tolerance for individual interaction. We will identify with you both low trust and high trust events with confidence, enabling you to instantly spot cybercriminals while providing a next-generation user experience to your valuable customers.

Integration Optimization

As data traffic is analyzed from all integration points, we monitor and test the solution to help you fine-tune policies. Over time, you’ll be able to pinpoint and block bad actors with increasing accuracy—reducing friction and accelerating the user experience for trusted users. This filtering process is continuously refined until all of your performance targets are met or exceeded.

Show Less
image description

Workflow and Optimization

Your enablement team helps you operationalize the ThreatMetrix case management and workflow solution to monitor, update, isolate and investigate transactions that require further review. Alternatively, where case management infrastructure... Show More

Your enablement team helps you operationalize the ThreatMetrix case management and workflow solution to monitor, update, isolate and investigate transactions that require further review. Alternatively, where case management infrastructure already exists, we will help you make best use of the open data returned by ThreatMetrix to integrate into your existing platforms and downstream systems.

Your dedicated Technical Account Manager (TAM) can help as-needed in any areas you require, including:

  • Strategic process design
  • Preparation for, or responses to, new needs assessments
  • New use cases and API integrations

 
Rules Optimization
 
We offer onsite policy and business rules optimization along with training on an annual, semi-annual or quarterly basis. Depending on package you select, this service includes:
 

  • Rules optimization assessment and truth data analysis
  • Creation and modification of rules to quickly respond to new fraud challenges
  • Identify, categorize and act on new fraud patterns and trends
  • Due diligence questionnaires, audits and more

 
Quarterly Business Reviews
 
Quarterly Business Reviews are designed to level-set your team’s success with the ThreatMetrix platform, and to assess new organizational requirements. This includes:
 

  • A review of your existing deployment, including key health indicators and use case analysis and any changes made and improvements seen since the last review.
  • Analysis of customer-provided “truth data” (analysis of false positives and false negatives), and correlation with existing rules.
  • A report on findings, with recommendations for adjustments or additions to rules.
  • Planning for any new solution enhancements needed in the next 90 days.

 
It also provides ThreatMetrix Professional Services a chance to apprise your team on emerging threats and methods for mitigating them.
 
Health Checks
 
Designed for existing ThreatMetrix customers, the Health Check service involves an examination and audit of your current installation, including:
 

  • Examination of key health indicators
  • High-level review of policies and rules
  • Use case analysis

 
At the conclusion of each Health Check, ThreatMetrix Professional Services will provide a written report including recommendations and procedures to improve the system relative to new threats and changing business needs.

Show Less
Professional Services Solution Brief
View Now