Blog

  • Using AI to Assess Identity Risk and Treat Good Customers Better

    Using AI to Assess Identity Risk and Treat Good Customers Better

    The democratization of artificial intelligence has had a dramatic impact on how businesses approach identity risk. Prior to its introduction, there were already an influx of data points streaming into…

  • Gauge Identity Quality with Attribute Volatility – Ekata Pro Insight

    Gauge Identity Quality with Attribute Volatility – Ekata Pro Insight

    Attribute Volatility – the number of times an attribute of an identity has changed in recent transactions Examples of the attribute volatility: The provided phone number has been seen with…

  • Ecommerce Fraud Prevention with Merchant Popularity – Ekata Pro Insight

    Ecommerce Fraud Prevention with Merchant Popularity – Ekata Pro Insight

    Merchant Popularity – the number of merchants where an attribute has been seen in recent transactions In our Pro Insight solution, you’ll find the merchant popularity attribute located in the…

  • Email and IP: The Digital Side of Identity Verification

    Email and IP: The Digital Side of Identity Verification

    More and more, brick-and-mortar lenders are taking their businesses online. This shift towards digital transactions invites a whole new challenge to the way lenders verify the identity of their prospects…

  • How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    Two-factor SMS authentication is historically one of the most reliable ways to block bad actors from setting up fraudulent accounts, since it requires the user to have a cell phone…

  • 3 Ways to Prevent eGift Card Fraud

    3 Ways to Prevent eGift Card Fraud

    As technology has advanced, it has become evident that even the online retailers that have fraud almost entirely in control still wrestle with losses from eGift card fraud. Many retailers…

  • Maintaining Platform Integrity with Layered Consumer Identity Verification

    Maintaining Platform Integrity with Layered Consumer Identity Verification

    Consumer technology services platforms are expected to maximize growth, but they also are challenged to maintain platform integrity. The latter has become increasingly difficult as the number of bad actors…

  • De Facto Key to Digital Identity: Phone Validation

    De Facto Key to Digital Identity: Phone Validation

    Validating phone number data helps merchants prevent fraudulent orders, speed good customers to clear, and avoid social engineering. Within a layered fraud prevention approach, phone data provides actionable signals for…

  • Part 3: Know Your Data, Measure Your Data, Judge Your Data

    Part 3: Know Your Data, Measure Your Data, Judge Your Data

    Previous articles in this series covered the richness and completeness of data, this final article will discuss the third key to good identity verification data; accuracy.  Accuracy can be the…

Contact Us

Let our team of experts find the product that’s right for you.