I work under fraud analytics. So I use this product to extract cases from there and then send it to Ops to review and analyze. Then mark it as either fraud or genuine. And if we get bad IPs from there, I add it up to our negative IP list. So it's pretty useful operation wise, and also in terms of some inquiries from us, if a customer is disputing they didn't receive an OTP password on their online transaction, and then they're disputing that it's not theirs, and it's unauthorized, but it was a successful transaction,
I use this product to see the customer's previous IP addresses. If they used it genuinely before then we ask them again, that this IP address or this device was used genuinely on these so and so days. And how come they say it's unauthorized. Maybe check if it's your son who used your phone or so forth.
In other scenarios we would require if you are saying someone has ported your phone to get the OTP from your phone, please get a certificate from your network, something like that.
It's pretty useful for our daily online pretty secure needs. So I don't know yet, I don't know yet. I'm still new as an analyst, but if I had wish it would be this one, this authentication for fingerprint and face would be promising.
That will solve my problems with a customer saying they didn't authorize, they didn't sent that OTP, when in fact we saw that it's a successful one, and how can you prove that it wasn't you? Yeah. Will solve that problem.