Location
True Location And Custom Geofencing.
features
variety of services
LOCATION VALIDATION
Discover the true location of your customers and find out how location affects your sales and security.
MULTI-DEVICE VERIFICATION
Increase identity verification accuracy with challenge and response questions that only your customers should be able to answer.
PROXY PIERCING
Proxy and IP detection uses packet inspections to identify visitors hiding behind proxies and determine their true IP address and location.
DEVICE REPUTATION
Evidence-based device reputation determines risk, historical activity, and potential fraud and alerts you before it happens.
CUSTOMER & DEVICE CONNECTIONS
Real-time pattern recognition instantly identifies subtle connections among devices, customers, and transactions with zero delay.
DEVICE FINGERPRINTING
Real-time tracking monitors shared devices, returning customers, and high-risk profiles, promptly alerting you to potential fraudulent activities.
benefits
Layered Location Technologies
Combining Advanced IP Mapping, Open and Closed-Loop Wi-Fi Signal, Cellular Carrier Location creates a versatile location validation solution capable of handling various scenarios in multiple environments.
Multi-Device Authentication
Enhance audited validation by comparing the location of the customer's connected device with trusted secondary sources like mobile carriers, social media connections, and device index patterns, boosting accuracy for regulatory verification.
Geo-Fencing & Location KBA
Geo-fencing monitors customer activity and triggers alerts based on pre-set rules, while Location Knowledge Based Authentication (LKBA) generates time-sensitive challenge questions tied to the customer's current location, offering an additional layer of security.
Proxy, Botnet, MNB Cloud Indexes
Through packet inspections, proxy, and true IP detection unveil hidden visitors' actual IP addresses, while a botnet reputation correlation engine identifies potential threats based on past IP traffic. Cloud-based man-in-the-browser detection exposes manipulation attempts without requiring client installations.
Pattern Recognition Alerts
In real-time, our cloud-based pattern recognition engine establishes connections between customers, devices, and transactions, proactively preventing fraud before it occurs. The integration of device screening and globally distributed intelligence strengthens security measures.
Device Anomaly Detection
Instantly identifying discrepancies in time zones, language settings, and browser/OS combinations, our device anomaly detection system offers insights into vulnerable environments and forewarns about zero-day malware attacks, bolstering cybersecurity measures.