Blog

  • Response Times 101

    Response Times 101

    For a company that provides API products, a key metric on the performance of an API is to track and iterate on its response time. What is Response Time? It’s…

  • Why Email isn’t Enough for Fraud Mitigation

    Why Email isn’t Enough for Fraud Mitigation

    Data breaches unfortunately can happen to anyone. In a large data breach in January 2019, there were 773 million email addresses and 21 million passwords compromised. This is an ongoing…

  • Why Your Fraud Model Needs Validated ID Data Designed for Risk

    Why Your Fraud Model Needs Validated ID Data Designed for Risk

    Today, there are many identity data providers to choose from, and most offer data consumption via API. However, identity data APIs are not all the same. Few providers design their…

  • Shutting Down New Online Account Opening Fraud

    Shutting Down New Online Account Opening Fraud

    For many merchants, the biggest security focus is around credit card fraud: the moment when a bad actor pulls out a fake credit card and makes a fraudulent transaction. But…

  • Leverage Our Dynamic Identity Data for Your Marketplace Company

    Leverage Our Dynamic Identity Data for Your Marketplace Company

    Marketplace companies are inherently unique, which means they’ve become especially good at adapting standard business solutions and processes into something that fits their own flexible business models. Most marketplace companies…

  • Learn Best Practices for Graph-Based Identity Databases

    Learn Best Practices for Graph-Based Identity Databases

    Determining the legitimacy or risk of the identities behind a transaction during manual review can require multiple internal and external tools. The process is investigative by nature from basic checks…

  • Going Beyond Transactional Fraud With Identity Data

    Going Beyond Transactional Fraud With Identity Data

    Typically, merchants use identity data to prevent transactional fraud and use real-time identity verification in order to keep fraudsters from making a purchase. But lately, we’ve seen a trend among…

  • Increase Conversions with Progressive Signup Flows

    Increase Conversions with Progressive Signup Flows

    The most important metric that any tech company centers around is growth. In B2B SaaS, it’s typically ARR growth. With app-based B2C companies, it’s commonly growth in monthly active users…

  • Email and IP: The Digital Side of Identity Verification

    Email and IP: The Digital Side of Identity Verification

    More and more, brick-and-mortar lenders are taking their businesses online. This shift towards digital transactions invites a whole new challenge to the way lenders verify the identity of their prospects…

  • How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    How Identifying Carriers Makes Two-Factor SMS Authentication More Secure

    Two-factor SMS authentication is historically one of the most reliable ways to block bad actors from setting up fraudulent accounts, since it requires the user to have a cell phone…

  • The Importance of Online Lending Decisioning Platforms

    The Importance of Online Lending Decisioning Platforms

    As the online lending landscape continues to evolve, the way lenders handle risk management is changing. In the face of pervasive fraud attempts, more online lenders are realizing the critical…

Contact Us

Let our team of experts find the product that’s right for you.