Detect Fraudsters Using Fake User IDs Or VPNs With Device Fingerprinting
Detect fraudsters using fake user IDs or VPNs with device fingerprinting. Our system uses the information gathered from the device hardware and software to create a unique identifier that can be used for verification. This identifier is then compared to previously collected device fingerprints in our database. When a match is found, the account or transaction is flagged for further review. Depending on your security policies, this can include blocking the device or requiring additional authentication measures.
ThreatMetrix device fingerprinting capture rate based on a combination of device, browser, and packet data – even when Flash, JavaScript, cookies, and other plugins are disabled. Enhanced detection capabilities to better identify account takeovers, man-in-the-middle attacks, hidden botnet proxies and malware, and more.
ThreatMetrix Device Fingerprinting: Strengthening Your Security Arsenal
Gleaning a precise picture of users’ devices and their online behavior can help improve your fraud detection rates in a significant way. It’s a critical tool in the fight against bonus abuse, multi-accounting, and more.
We take privacy seriously, and we strive to balance security with the needs of our customers. Our Customers choose which personal information (such as names, mobile phone numbers, email addresses, mailing addresses, location information, payment card and other cardholder data, eCommerce transaction data, and device identifiers) the ThreatMetrix service is authorized to receive. This data is then tokenized, which means that the original identifiers are replaced with a random set of characters that cannot be used to re-identify the customer. The tokens are then matched across different submissions throughout our LexisNexis Digital Identity Network and combined into a unique digital identifier, known as the device fingerprint.