image description

Threat Detection

Outsmart bot attacks and secure consumer devices against malware, Trojans and viruses

Real-Time Protection Against the Latest Threats

ThreatMetrix secures consumer devices against malware, Trojans, Man-in-the-Middle (MitM), Man-in-the-Browser (MitB) attacks and phishing. Our solutions monitor, track and analyze point-in-time transactions including login, payment, enrollment and profile change details in the context of surrounding information such as user time on page and the actions he or she has performed.

Protect Against Malware, Trojans and Viruses

Comprehensive platform coverage against malware

ThreatMetrix provides comprehensive malware coverage for mobile, Web and endpoints.

Mobile Protection verifies the integrity of the... Show More

ThreatMetrix provides comprehensive malware coverage for mobile, Web and endpoints.

Mobile Protection verifies the integrity of the application in which it is embedded to ensure it has not been modified or infected It also analyzes all other apps installed on the device, and reports their reputation and the presence of any malicious code.

Web Protection empowers non-signature-based page fingerprinting techniques that pick up where leading anti-malware solutions leave off. Our solution can detect Web page elements that have been altered by cybercriminals, suggesting a MitB-based malware attack. In addition, our Honeypot technology identifies malware by detecting unauthorized webpage modifications in the browser.

Endpoint Protection mitigates the risk of hidden malware compromising authenticated sessions to steal data, identities or money. A small client component installed on end user devices isolates or neutralizes malware, verifies legitimate websites, protects the online session with the business, and communicates with the business to identify potential fraud.

Show Less

Stop Low-and-Slow Bot Attacks

Outsmart sophisticated bot attacks by analyzing their behavior and true location

ThreatMetrix examines how a device interacts with a page to automatically determine the presence of bots, scripted attacks and other automated attacks. Our solution can locate hidden proxies through which botnets operate. The new generation... Show More

ThreatMetrix examines how a device interacts with a page to automatically determine the presence of bots, scripted attacks and other automated attacks. Our solution can locate hidden proxies through which botnets operate. The new generation of private botnet proxies do not appear on public proxy lists and cannot be detected by the usual methods. Our TrueIP can pierce through proxies to find the IP address of the fraudster behind the proxy, including traditional anonymous proxies and ones used by botnets.

Show Less

Defeat Location Spoofing

Unmask cybercriminals hiding behind proxies and VPN servers

ThreatMetrix can determine if cybercriminals are trying to mask their true locations to cover up their tracks. With a foundation of intelligent packet and browser packet analysis, our solutions allow you to pierce through proxies and uncover... Show More

ThreatMetrix can determine if cybercriminals are trying to mask their true locations to cover up their tracks. With a foundation of intelligent packet and browser packet analysis, our solutions allow you to pierce through proxies and uncover the malicious user’s true IP address. Our unique VPN and TOR detection capability performs deep analysis of incoming TCP/IP connections that reveal connection specific attributes. These attributes help analyze the network connection type from an originating device, such as Ethernet, 3G, WiFi, VPN and others. Our technology also has the ability to distinguish between normal IPs and VPN-based IP addresses.

Show Less
Schedule A Demo Today
Schedule A Demo