ThreatMetrix Advances Cybercrime Prevention by Combining Sophisticated Trust Analytics with Improved Endpoint and Behavior Intelligence
Posted April 3, 2014
Enhancements Enable the ThreatMetrix TrustDefender™ Cybercrime Protection Platform to More Effectively Distinguish Trusted Users from Cyberthreats
San Jose, Calif. – April 3, 2014 – ThreatMetrix®, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced the availability of the ThreatMetrix® Spring 2014 Release, an extension to the company’s ThreatMetrix Platform. This update delivers several new enhancements related to data collection and real-time trust analytics that help better model and differentiate between trusted users and cybercriminals.
With the Spring 2014 Release, ThreatMetrix launches a next generation, shared global intelligence solution that significantly enhances the recognition of devices, identities and behaviors across the ThreatMetrix Digital Identity Network. The new capabilities add significantly to the types of data that are collected and analyzed to create an online persona.
“With most of today’s end users conducting business transactions online, cybercrime prevention is all about differentiating between trusted identities and potential fraudsters,” said Mustafa Rassiwala, senior director of product management, ThreatMetrix. “The Network delivers real-time intelligence that’s not available in other solutions, providing customers with consistent risk assessments of data across a global network and creating a digital persona of users by mapping their online personas and devices.”
The Spring 2014 Release enhances ThreatMetrix’s context-based security and advanced fraud prevention solutions through:
• Endpoint Intelligence – Advanced endpoint intelligence enables businesses to detect returning, authentic customers and flag identity and device anomalies that indicate malicious behavior. Specifically, ThreatMetrix enhancements available this spring include:
o Next-generation detection of true IP addresses when customers are using proxies providing a complementary solution to existing proxy-piercing technology.
o Improved font detection for more accurate device identification.
o ThreatMetrix SmartID™ upgrade, enabling additional attributes to be integrated into analysis of cookieless device identification.
o IP geo upgrade, offering more precise and granular geolocation information.
o ThreatMetrix TrustDefender™ Client upgrades, offering the power of a dedicated endpoint protection client to real-time cybercrime prevention. With TrustDefender Client, customers can now create security posture rules with an added protective layer to their existing rules – examining the security status such as the presence or absence of security software. Additionally, the rules can examine the strength of the password used to authenticate the user on the device and presence of malware, adware, spyware and more.
• Behavior Intelligence – Various contextual factors come together to uniquely identify each identity and ThreatMetrix leverages cross-correlation and analytics across contextual factors to provide better indicators of malicious actions. The Spring 2014 Release enables ThreatMetrix™ Trust Tags to be dynamically updated with values derived from attributes as part of the transaction. For example, a user’s identity can now be tagged with his or her mobile phone number when he or she successfully completes authentication through the mobile phone.
• Trust Analytics – Leveraging global trust analytics, ThreatMetrix examines every transaction across a consistent set of ThreatMetrix-defined identity authentication rules in addition to individual enterprise-defined rules. Analyzing over 500 million transactions a month using a consistent set of rules enables ThreatMetrix to benchmark, baseline and detect long-term trends for fraudulent activities such as identity spoofing, device spoofing, IP address/geolocation spoofing and presence of malware (man-in-the-browser) attacks. ThreatMetrix can now provide unprecedented analytics to enterprises and improve their identity authentication policies by comparing against global benchmarks derived from peers in their industry, the size and scale of the enterprise, geographic location and more.
“The ThreatMetrix solution is much more effective than traditional recognition capabilities because it leverages billions of data points from The Network, sharing anonymized information across business boundaries to identify patterns for authentic returning customers and cybercriminals,” said Rassiwala. “Overall, the next-generation solution from ThreatMetrix will effectively reduce friction for returning customers while keeping cybercriminals out in real time.”
ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.
ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix Digital Identity Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.
The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.
For more information, visit www.threatmetrix.com or call 1-408-200-5755.
© 2014 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.