SOLUTIONS

Risk Scoring

Make educated decisions at critical points in your app workflows to reduce data loss, fraud, and account takeover.

ThisData uses complex risk detection algorithms to build a risk score for users and critical events or actions taken within your application. We score every event in real-time by passing it through a series of risk analyzers.

These analyzers are based on behavioral activity from your users, industry risk databases, and the collective intelligence we gather via Machine Learning and analysis of anonymized data which is aggregated across our customer base.

  • Unknown devices
  • High risk IP addresses
  • Suspicious login locations
  • Tor usage
  • Whitelist and blacklist countries
  • Velocity checking
  • Geo-location anomalies
  • Project Honey Pot
  • AlienVault Open Threat Exchange
Device Fingerprinting

Device Fingerprinting

We build up a collection of devices that are known to be high-risk or involved with other security breaches. If one of these devices attempts to access your application, an appropriate risk score will be allocated to prevent data loss or fraud before it happens.

Tor Usage

Tor is a network protocol and browser that hides a user’s location by bouncing their traffic through a number of access points. ThisData monitors for Tor exit nodes - where the connection emerges back on to the traditional internet - as a way of ensuring unauthorised access to data is flagged in real-time.

Tor Usage
Project Honey Pot

Project Honey Pot

This is a database containing over 120 million ‘bad’ IP addresses that have been reported in the past as having been used by spammers or hackers. We match the IP addresses of user logins against this database and alert when it appears as if a malicious user is attempting to gain access.

Velocity Tracking

We track the speed at which a user’s location changes between logins and other events. If they appear to be moving at superhuman speeds, we fire up an alert for risky behavior.

Velocity Checking
Alien Vault

Open Threat Exchange

We partner with AlienVault to gain access to a crowd-sourced database of known attack patterns and indicators of compromise. This integration enables our algorithms to adjust rapidly when members of the intelligence community report or upload breach or attack data.

Analyzers
Account Takeover
Analyzers
Two Factor Authentication
Analyzers
Continuous Authentication
Analyzers
Fraud Detection
Analyzers
Adaptive Authentication
Analyzers
Risk Scoring