Resources banner

About the author

Mastercard Identity Avatar

Resources By This Author

  • The Unique Challenges of Marketplace Risk Assessment & Management

    The Unique Challenges of Marketplace Risk Assessment & Management

    Digital commerce has evolved into much more than just buying and selling on a website. Marketplaces—platforms that directly connect buyers and sellers—are springing up in nearly every industry. Marketplace startups…

  • Learn Best Practices for Graph-Based Identity Databases

    Learn Best Practices for Graph-Based Identity Databases

    Determining the legitimacy or risk of the identities behind a transaction during manual review can require multiple internal and external tools. The process is investigative by nature from basic checks…

  • Going Beyond Transactional Fraud With Identity Data

    Going Beyond Transactional Fraud With Identity Data

    Typically, merchants use identity data to prevent transactional fraud and use real-time identity verification in order to keep fraudsters from making a purchase. But lately, we’ve seen a trend among…

  • Build.com Improves Homes – And SLAs – With Ekata Insight

    Build.com Improves Homes – And SLAs – With Ekata Insight

    For over seventeen years, Build.com has provided their customers with the lighting, plumbing, flooring, and appliances they need to get the job done. As the second largest online home improvement…

  • Increase Conversions with Progressive Signup Flows

    Increase Conversions with Progressive Signup Flows

    The most important metric that any tech company centers around is growth. In B2B SaaS, it’s typically ARR growth. With app-based B2C companies, it’s commonly growth in monthly active users…

  • Email and IP: The Digital Side of Identity Verification

    Email and IP: The Digital Side of Identity Verification

    More and more, brick-and-mortar lenders are taking their businesses online. This shift towards digital transactions invites a whole new challenge to the way lenders verify the identity of their prospects…

  • How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    Two-factor SMS authentication is historically one of the most reliable ways to block bad actors from setting up fraudulent accounts, since it requires the user to have a cell phone…

  • GDPR and Ekata

    GDPR and Ekata

    Companies operating within the European Union (EU) or outside organizations conducting any business in the EU have been scrambling to prepare for the General Data Protection Regulation (GDPR) implementation date…

  • False Positives Wedge Merchants Between a Rock and a Hard Place

    False Positives Wedge Merchants Between a Rock and a Hard Place

    There’s a fine line between writing fraud prevention rules so tight that they catch all fraud, and ensuring that legitimate customers have a good experience. False positives, (aka “false declines”…

Contact Us

Let our team of experts find the product that’s right for you.