Blog

  • Data Update: Expanded Name Matching in APAC Region

    Data Update: Expanded Name Matching in APAC Region

    We strive to consistently improve our global data coverage and precision. Data is vital to the success of your business, and is especially important when verifying identities. At the core…

  • How Phone and Email Data is used in Transactions Around the World

    How Phone and Email Data is used in Transactions Around the World

    Regardless of where you are in the world, Ekata can help verify your identity, determine whether or not a transaction is high risk or low risk, and give the data…

  • How to clean up your database

    How to clean up your database

    Is it time to clean up your database? If you’re a retailer using remarketing, make sure your records haven’t gone stale.

  • Using AI to Assess Identity Risk and Treat Good Customers Better

    Using AI to Assess Identity Risk and Treat Good Customers Better

    The democratization of artificial intelligence has had a dramatic impact on how businesses approach identity risk. Prior to its introduction, there were already an influx of data points streaming into…

  • Gauge Identity Quality with Attribute Volatility – Ekata Pro Insight

    Gauge Identity Quality with Attribute Volatility – Ekata Pro Insight

    Attribute Volatility – the number of times an attribute of an identity has changed in recent transactions Examples of the attribute volatility: The provided phone number has been seen with…

  • Ecommerce Fraud Prevention with Merchant Popularity – Ekata Pro Insight

    Ecommerce Fraud Prevention with Merchant Popularity – Ekata Pro Insight

    Merchant Popularity – the number of merchants where an attribute has been seen in recent transactions In our Pro Insight solution, you’ll find the merchant popularity attribute located in the…

  • Email and IP: The Digital Side of Identity Verification

    Email and IP: The Digital Side of Identity Verification

    More and more, brick-and-mortar lenders are taking their businesses online. This shift towards digital transactions invites a whole new challenge to the way lenders verify the identity of their prospects…

  • How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    Two-factor SMS authentication is historically one of the most reliable ways to block bad actors from setting up fraudulent accounts, since it requires the user to have a cell phone…

  • 3 Ways to Prevent eGift Card Fraud

    3 Ways to Prevent eGift Card Fraud

    As technology has advanced, it has become evident that even the online retailers that have fraud almost entirely in control still wrestle with losses from eGift card fraud. Many retailers…

  • Maintaining Platform Integrity with Layered Consumer Identity Verification

    Maintaining Platform Integrity with Layered Consumer Identity Verification

    Consumer technology services platforms are expected to maximize growth, but they also are challenged to maintain platform integrity. The latter has become increasingly difficult as the number of bad actors…

  • De Facto Key to Digital Identity: Phone Validation

    De Facto Key to Digital Identity: Phone Validation

    Validating phone number data helps merchants prevent fraudulent orders, speed good customers to clear, and avoid social engineering. Within a layered fraud prevention approach, phone data provides actionable signals for…

Contact Us

Let our team of experts find the product that’s right for you.