Take the Next Step – Check out our Resource Center!

Get informed and discover what ThreatMetrix digital identity solutions can do for your business

Periodic Table of Digital Identity Assessment

Periodic Table of Digital Identity Assessment

View Now
Cybercrime Report Q3 2016

ThreatMetrix: Cybercrime Report: Q3 2016

Read The Full Report
Anti-Fraud Security Techniques

Top 10 Anti-Fraud Tips

Download E-Book

Filter The Resource Center:


First Annapolis Report: The Path to Digital Transformation

ThreatMetrix conducted a sponsored research study in conjunction with First Annapolis, a leading consulting and M&A advisory firm to measure the long-term economic impact of adding unnecessary...

Securing Mobile Applications in an Evolving Fraud and Threat Landscape

ThreatMetrix enables enterprises and businesses to deploy a passive authentication solution while actively preventing fraud and detecting possible threats in order to secure mobile apps and mobile app transactions.

Four Key Elements to Verify Digital Identities

Understanding the digital DNA of users and their unique online footprint can knit together trusted digital identities that fraudsters…

How to Defend Against Botnet Attacks

Organized botnet attacks are clever and unforgiving. They are looking for the next easy target, striking not just at an operational level, but at the heart of customer trust. As we march into the age of...

Cybercrime Battle Basics – Online Account, Transaction and Malware Protection

Today’s threat environment requires integrated defenses that work beyond network perimeters to protect transactions and identities.

Insider Threat Protection

Insider threats have been a major concern among IT security professionals for decades. Password theft and password sharing have been, and continue to be, among the most harmful of these. Fortunately, with the…

View More

Case Studies

ThreatMetrix Supporting Visa Consumer Authentication Service

Visa needed a way to incorporate dynamic shared intelligence to verify users even if they were logging on from different devices or locations. ThreatMetrix allowed Visa to augment their network level data with device analytics to make better fraud decisions.

Reduce the Requirement for Security Tokens at Login for Lloyds Banking Group

Lloyds Banking Group estimated their fraud losses could peak at around $60 million per year by 2018 if they didn’t stem the tidal wave of fraud attacks. ThreatMetrix is now delivering a 30% sustained reduction in...

Netflix Global Expansion Supported by ThreatMetrix

As Netflix expanded into emerging global markets, the risk of fraud also increased. With ThreatMetrix, Netflix was able to leverage global shared intelligence from the Digital Identity Network in order to accurately detect fraudulent new account requests in real time.

ThreatMetrix Stops Hard-to-Detect Fraud on MoneyPlace’s P2P Loans Platform

Niche and alternative finance providers are key targets for fraudsters looking to capitalize on innovative lending models. Examine how ThreatMetrix helps MoneyPlace authenticate loan applicants in real time by correlating the user’s transaction data with dynamic intelligence.

ThreatMetrix Reduces Customer Friction by 65% for a Large International Bank

The financial services industry continues to be a lucrative target for fraudsters looking to infiltrate existing customer accounts or set up new ones to launder money, and this bank was no exception. Read how the bank used ThreatMetrix to authenticate legitimate customers in real time.

ThreatMetrix Enables San Jose Earthquakes to Deliver Secure Online Ticket Buying Experience

ThreatMetrix allows the Quakes to confidently secure their ticket purchasing platform by accurately identifying high-risk or fraudulent behavior in real time. Fans enjoy a better online buying experience and are not subjected to friction at a time when they are eager to get their hands on a ticket to the next game.

View More

Solution Briefs

ThreatMetrix Company Overview

Who is ThreatMetrix and what do we do? ThreatMetrix® is the market-leading cloud solution for authenticating…

Dynamic Decision Platform

Accurately authenticating trusted users, detecting fraudsters in real time and predicting high-risk behavioral patterns with pinpoint accuracy

ThreatMetrix Digital Identity Network

The ThreatMetrix Digital Identity Network collects and processes global shared intelligence from millions of daily consumer interactions including logins, payments and new account applications. Using this information, ThreatMetrix creates a unique digital identity for each user.

Fraud Prevention for Government Agencies

Government data breaches can have an extremely negative effect on public perception, reputation and trust.

Cloud-Based Defense Against Fraud, Malware and Data Breaches

ThreatMetrix Web is providing businesses and consumers a new defense against...

Prevent Account Takeover

When customer accounts are compromised by fraudsters, damage is not purely restricted to financial loss. Account takeover can severely impact business reputation growth.

View More

ThreatMetrix CyberCrime Labs

Cybercrime Report Q3 2016

The ThreatMetrix Cybercrime Report: Q3 2016 is based on actual cybercrime attacks from July 2016 – September 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

Cybercrime Report Q2 2016

The latest ThreatMetrix Cybercrime Report is based on actual cybercrime attacks from April 2016 to June 2016 that were detected during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

Cybercrime Report Q1 2016

The ThreatMetrix Q1 2016 Cybercrime Report details the current threat and cybercrime environment as a huge firestorm that keeps feeding itself. Fraud attacks are evolving, and becoming more...

Cybercrime Report Q4 2015

The latest ThreatMetrix Cybercrime Report is based on actual cybercrime attacks from October 2015 – December 2015 that were detected during real-time analysis and interdiction of...

View More