Using Persona ID Rules, Companies Now Gain a Comprehensive View into Fraud and Security
San Jose, CA (PRWEB) February 25, 2013
ThreatMetrix™ , the fastest-growing provider of integrated cybercrime prevention solutions, today announced the introduction of behavioral analysis in the ThreatMetrix™ Cybercrime Defender Platform via the ThreatMetrix™ Persona ID Rules, enabling real-time linkage of a current transaction to related transactions through a matrix of attributes associated to the visitor, device and connection.
ThreatMetrix Persona ID Rules uncovers anomalous behavior in real-time through the association of related activity and connected entities such as email addresses, transactions, accounts, devices, IP addresses, geo-location, proxies, and physical addresses. It also allows the use of custom fields such as credit cards for creating customer-specific user profile building. The Rules then score the divergence (anomalies) or convergence (similarities) between current and historical attributes.
The historically separate worlds of fraud and security are now able to merge with ThreatMetrix, providing companies with a comprehensive view of the threat landscape. If an identity is stolen and replayed on a compromised device in the hands of a cybercriminal or foreign state actor, ThreatMetrix can detect the threat through the ThreatMetrix Persona ID Rules and send an alert.
“Cybercriminals and cyber-terrorists are exploiting the fact that many of today’s traditional authentication and verification systems rely largely on breached personal data, which is easily discoverable or self-disclosed on popular social networks,” said Alisdair Faulkner, chief products officer, ThreatMetrix.
In 2012 alone, cyber-attacks resulted in data breaches at high profile brands such as Yahoo!, eHarmony, Zappos, LinkedIn, Global Payments and many others. The result is that hundreds of millions of personally identifiable information entities including credit cards, Social Security numbers, passwords and other data have fallen into the hands of cybercriminals.
“We circumvent these attacks through the ThreatMetrix™ Global Threat Intelligence Network that is a repository of devices, anonymized identities, transactions and interactions,” added Faulkner. “We enable our customers to query this repository in real-time to determine whether a transaction is a legitimate customer or actually a cybercriminal hiding behind a spoofed or stolen alias. ThreatMetrix Persona ID Rules helps create a user profile thro