Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
We address the challenges of digital identity and financial fraud risks, making it easier for your organization to safeguard itself. With our background as former in-house fraud and risk managers, we possess a deep understanding of the intricate and evolving threats that organizations encounter on a daily basis. Our platform is the most extensive solution available, designed to tackle your digital risks effectively. Are you employing a reactive strategy for fraud prevention and often feel one step behind? Our extensive suite of fraud management solutions empowers you to take charge and enables you to proactively detect online fraud threats. We deliver a real-time assessment of risk for each transaction through our award-winning technology, which evaluates risk based on factors such as device intelligence, behavioral patterns, geographic data, customer characteristics, payment details, and information pertaining to the purchase and associated transactions. By leveraging advanced machine learning models alongside established rules, we can distinguish between legitimate customers, minimize manual reviews, and flag potentially risky transactions, ensuring that your organization remains a step ahead in the fight against fraud. This proactive stance not only enhances security but also boosts overall operational efficiency.
Description
All types of frauds can be addressed with one solution. Subex Fraud Management is a 25-year-old domain expertise that provides 360 degree fraud protection across digital service by leveraging advanced machine intelligence and signaling intelligence. This solution combines a traditional rule engine with advanced AI/machine learning capabilities to increase coverage across all services and minimize fraud run time in the network. It also includes real-time blocking capabilities. The Subex Fraud Management solution's core is a hybrid rule engine. It covers detection techniques such as expressions, thresholds, and trends. Rule engine comprises of a combination of threshold rules, geographic rules, pattern (sequential) rules, combinatorial rules, ratio/proportion-based rules, negative rules, hotlist based rules, etc. These rules allow you to monitor advanced threats in your network.
API Access
Has API
API Access
Has API
Integrations
Ekata
NuDetect
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Accertify
Founded
2007
Country
United States
Website
www.accertify.com
Vendor Details
Company Name
Subex
Founded
1992
Country
India
Website
www.subex.com/fraud-management/
Product Features
Chargeback Management
Chargeback Dispute Management
Chargeback Insurance
Chargeback Prevention
Chargeback Recovery
For Banks / Issuers
For Merchants
For Suppliers / Manufacturers / Distributors
Fraud Detection
Reporting / Analytics
Fraud Detection
Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval
Payment Gateways
ACH / eCheck support
Buyer Authentication
Credit / Debit Support
Customer Information Storage
Fraud Prevention
Invoicing
Multi-Currency
PCI Compliance
Point-of-Sale (POS)
Recurring Billing / Subscriptions
Reporting / Analytics
Product Features
Fraud Detection
Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval
Telecom Expense Management
Billing for Data
Billing for Voice
Call Monitoring
Chargeback Tracking
Contract Negotiation
Fixed Line Compatibility
Internal Cost Allocation
Mobile Line Compatibility
Usage Reporting