By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

FRAUD DETECTION

Silently detect suspicious logins so real customers can zip right through

Fraud detection

In real life it’s easy enough to spot suspicious behavior. Doing that online is tougher. You need to know what “unusual” activity looks like. It could be the time, location or device from which someone is trying to login. Strivacity checks all that 24/7 so you can block suspicious users or trigger additional authentication.

Benefits

Avoid threats

Prevent fraud and account takeover (ATO) incidents

Simple journeys

Keep sign-in friction low for your real customers

Built with intel

Evaluate user activity against the latest 3rd party threat intel

How it works

All of our fraud detection capabilities are configured with drop-down menus and on/off buttons in our admin interface. When the Strivacity fraud engine detects a potential imposter the customer is prompted to re-authenticate with MFA.

Don Assalone, Director of Global Cybersecurity

"Security is in Strivacity's DNA. That combined with the fact Strivacity was so easy to deploy and scale up convinced us they were the best solution."

Erica Tessier Hunt, VP Corporate Marketing

“I can’t emphasize the power of Strivacity's people enough. Throughout this entire process, it has been a partnership. We are not just a client, we are partners."

Strivacity Logo

How we’re different

Configure all fraud detection rules with clicks (not code)

Multiple techniques for networks, devices and behavior analysis

Machine learning identifies what’s “normal” for each customer

Strivacity Risk Engine™ continuously evaluates risk

Key capabilities

We use the most up-to-date 3rd-party threat intel from multiple sources and combine it with the Strivacity Risk Engine to ensure you’re keeping obvious bad actors at bay and evaluating every login to flag suspicious activity.

Trusted network and device detection

Evaluate the devices and networks customers use to sign in. Strivacity evaluates them against the latest 3rd party threat intel. If they look risky you can block the sign-in or ask the user to re-establish trust by authenticating with multi-factor authentication (MFA).

Behavioral analytics

The Strivacity risk engine uses machine learning to determine what “normal” behavior looks like for each customer. Then, when the location or time of day/week look odd, you can step up security and prompt the customer to authenticate with MFA.

Bot detection

Let your customers skip the Captcha clicks. Strivacity uses the latest intel on known bots, anonymous proxies and known Tor exit nodes so you can automatically block them when they try to sign in.

Fraud detection features

Feature

How it works

Trusted networks and device detection

Trusted devices

Allows customers to “remember” their device as long as you want. 3rd party integrations like Deduce let you check against 3rd party device trust data.

Trusted networks

Configure Strivacity to block connections or step up security from any IP addresses or networks.

Breached passwords

All passwords are checked at login against a constantly-updated database of known breached passwords.

Risky phone number detection

Restricts phone numbers frequently used by bad actors like non-fixed VoIP and 1-800 numbers.

SIM swap detection

Rejects phone numbers that have recently been switched from one device to another so bad actors can’t use stolen phone accounts.

Behavioral analytics

Location

Uses machine learning to step up security and require MFA when a customer’s login time of day or day of week is unusual.

Time of day / week

Assign customers to different groups manually or dynamically so you can personalize their experience.

Bot detection

Bot detection

Checks login and registration request to see if it’s associated with known bot activity and then block the login attempt.

Anonymous proxies / Tor

Steps up authentication if an IP address is associated with known anonymous proxies or Tor exit nodes.

Customer experience canvas

Create customer sign-in experiences that look and feel like your brand

See more

Lifecycle event orchestration

Keep your customers’ data in synch with your CRM, MarTech stack and custom apps

See more

Consent Management

Create, update and add consents into your sign-in journeys

See more

Identity verification

Verify customer IDs by checking telco records, document verification or knowledge-based verification

See more

Fraud detection

Flag bots and suspicious logins by analyzing device and customer activity

See more

Adaptive access controls

Pick the ways for customers to authenticate — MFA, Social login, SSO, biometrics or passwordless

See more

Registration & self service

Make it a breeze for customers to sign-up, sign-in and manage their account

See more