Blog

  • How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    Two-factor SMS authentication is historically one of the most reliable ways to block bad actors from setting up fraudulent accounts, since it requires the user to have a cell phone…

  • GDPR and Ekata

    GDPR and Ekata

    Companies operating within the European Union (EU) or outside organizations conducting any business in the EU have been scrambling to prepare for the General Data Protection Regulation (GDPR) implementation date…

  • False Positives Wedge Merchants Between a Rock and a Hard Place

    False Positives Wedge Merchants Between a Rock and a Hard Place

    There’s a fine line between writing fraud prevention rules so tight that they catch all fraud, and ensuring that legitimate customers have a good experience. False positives, (aka “false declines”…

  • The Importance of Online Lending Decisioning Platforms

    The Importance of Online Lending Decisioning Platforms

    As the online lending landscape continues to evolve, the way lenders handle risk management is changing. In the face of pervasive fraud attempts, more online lenders are realizing the critical…

  • How Ekata Approaches Cybersecurity and Data Privacy

    How Ekata Approaches Cybersecurity and Data Privacy

    We understand that the security and confidentiality of the data you send us is important. That’s why we continuously monitor our systems and regularly evaluate our information security controls to…

  • Why Know Your Customer (KYC) Isn’t Fraud Prevention

    Why Know Your Customer (KYC) Isn’t Fraud Prevention

    Banks and other financial institutions are all required by the PATRIOT Act to conduct a thorough review of new customers to undercut terrorist financing and combat money laundering. These Know…

  • Four Lessons from Building Products Using Machine Learning

    Four Lessons from Building Products Using Machine Learning

    In today’s world, machine learning has become ubiquitous, solving complex daily problems by recommending media, estimating wait times and even translating languages. It is undoubtedly a powerful tool, providing exciting…

  • Scaling Customer Account Openings in the Sharing Economy

    Scaling Customer Account Openings in the Sharing Economy

    The Sharing Economy continues to grow rapidly, with estimates that it will increase from $14 billion in 2014 to $335 billion in 2025. Underpinning this growth is a constant chicken-and-egg…

  • 3 Ways to Prevent eGift Card Fraud

    3 Ways to Prevent eGift Card Fraud

    As technology has advanced, it has become evident that even the online retailers that have fraud almost entirely in control still wrestle with losses from eGift card fraud. Many retailers…

  • Maintaining Platform Integrity with Layered Consumer Identity Verification

    Maintaining Platform Integrity with Layered Consumer Identity Verification

    Consumer technology services platforms are expected to maximize growth, but they also are challenged to maintain platform integrity. The latter has become increasingly difficult as the number of bad actors…

  • Four Key Tips for International Data Sourcing

    Four Key Tips for International Data Sourcing

    While the post on Tips for Selecting the best Data Vendor is as relevant as ever, there are unique considerations with international data. While Ekata has is a global company…

Contact Us

Let our team of experts find the product that’s right for you.