Payment Solutions Architect at a computer software company with 11-50 employees
Real User
Nov 12, 2020
The most valuable feature the solution has is that it is able to do a fairly accurate fraud assessment of a credit card transaction based on a variety of parameters configured by the merchant.
The most valuable thing is about the IP. They have a database of malicious IP addresses against which they check. They have a huge database for routed devices and the devices that have been used in the past to commit fraud. They have extensive historical records of all of that information, and that's probably the most valuable thing about ThreatMetrix. Over the years, they have been collecting and persisting globally across all the banking and financial services. They have been storing all this information.
It is this stored information that I and my team find valuable; it is not so much their technology. If you are running it on a simulator and trying to maliciously clone and copy IP addresses and stuff like that, they have a bunch of technologies, like routes section and all the other stuff. It is just that they have something that no one else can deal with, that is, massive amounts of big data about the malicious IP addresses, malicious device fingerprinting, the fingerprinting router devices, and the fingerprints.
You can query against this stored information to find out whether your app is in a good, nice environment. If yes, you get a green light. The last time I checked, there were about 400 or 500 features that they can stack against, which is pretty extensive. They give you a score against all those features for every application that you installed on it. It is pretty good in that sense.
ThreatMetrix leverages a large database of malicious IP addresses and device fingerprints to enable effective fraud assessment using historical data. Real-time analytics and customizable scoring rules help identify suspicious transactions, supporting fraud detection across diverse platforms.ThreatMetrix is renowned for its seamless integration with custom applications and device profiling, offering a robust system for risk mitigation through real-time analytics. While documentation is...
It is a stable solution.
The solution is stable.
There is excellent documentation available.
Accessible custom rules with a monthly update on performance.
The user interface, the portal, is very helpful in describing what attributes of concern are associated with the device.
The most valuable feature the solution has is that it is able to do a fairly accurate fraud assessment of a credit card transaction based on a variety of parameters configured by the merchant.
The most valuable thing is about the IP. They have a database of malicious IP addresses against which they check. They have a huge database for routed devices and the devices that have been used in the past to commit fraud. They have extensive historical records of all of that information, and that's probably the most valuable thing about ThreatMetrix. Over the years, they have been collecting and persisting globally across all the banking and financial services. They have been storing all this information.
It is this stored information that I and my team find valuable; it is not so much their technology. If you are running it on a simulator and trying to maliciously clone and copy IP addresses and stuff like that, they have a bunch of technologies, like routes section and all the other stuff. It is just that they have something that no one else can deal with, that is, massive amounts of big data about the malicious IP addresses, malicious device fingerprinting, the fingerprinting router devices, and the fingerprints.
You can query against this stored information to find out whether your app is in a good, nice environment. If yes, you get a green light. The last time I checked, there were about 400 or 500 features that they can stack against, which is pretty extensive. They give you a score against all those features for every application that you installed on it. It is pretty good in that sense.