Build security into your software

Leverage our security intelligence APIs to protect your users

ANOMALY DETECTION

Detect compromised user accounts
the moment the attacker logs in

AUTOMATED WORKFLOWS

Use webhooks to take immediate
action on confirmed threats

CONTEXTUAL AUTHENTICATION

Use real-time risk scores to verfiy
identity & improve user experience

TERMINAL
curl -XPOST 'https://api.thisdata.com/v1/verify.json?api_key=API_KEY' -d '{
  "ip" : "1.2.3.4",
  "user_agent" : "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_3)...",
  "user" : {
    "id" : "112233"
   }
}'
{
  "score" : 0.900,
  "risk_level" : "high",
  "triggers" : [
    "Accessed from the Tor network",
    "China is a new country"
  ]
}
THISDATA USES MACHINE LEARNING BASED ALGORITHMS TO DETECT HIGH RISK DEVICES, LOCATIONS, AND SUSPICIOUS USAGE PATTERNS IN REAL-TIME
Anomaly Detection

Detect compromised accounts & immediately notify users

User Verification
Complete Visibility

Get a forensic audit history of user account access & activity

Step Up Authentication
User Experience

Enable frictionless authentication & step up when risk is high

Security Automation
Security Automation

Reduce support loads & enable faster incident response times

AUDIT LOG

Beyond the breach

Save time digging through logs with a searchable audit history for every user accessing your app, which device they used, where they were located and what the associated risk of each action was.

Dashboard
Easy Documentation
API DOCUMENTATION

Read our simple documentation to quickly connect and start interacting with our API.

Read the docs
Developers Support
DEVELOPER SUPPORT

We're here to help. If you need assistance getting started our team is standing by.

Contact Us
SDK
SDKs

We have open source SDKs for popular languages to save you time getting started.

View SDKs

Automate Security Workflows

Use our API to asynchronously track log-ins and other events in your app. We build up a behavioral profile for every user, which can be used to make risk-based decisions on critical events like log-in, data deletion, or funds transfer.

SEE DOCUMENTATION
ThisData Flowchart

Are your users who they claim to be?

Zero configuration required. Get started in minutes

Get Started for Free

Get Started