Works in the background to verify users without introducing unnecessary friction.
Safeguard registration and login touchpoints to prevent account takeover attempts.
Continually monitor in-platform user activities to quickly detect and stop any fraudulent activity.
iBeta certified biometric technology to accurately distinguish between genuine users and fraudsters
For greater agility and the ability to approve more users, save time, effort, and man-hours.
Real-time identity monitoring for ongoing authentication and fraud prevention throughout a user’s digital journey.
To quickly create custom identity and authentication rules
By reducing false negatives and manual reviews.
A single platform to orchestrate all the necessary technologies in your onboarding flow with identity validation, managing new and old users, and making more assertive decisions regarding risks and monitoring results.
iBeta certified biometric technology to accurately distinguish between genuine users and fraudsters
For greater agility and the ability to approve more users, save time, effort, and man-hours.
Real-time identity monitoring for ongoing authentication and fraud prevention throughout a user’s digital journey.
To quickly create custom identity and authentication rules
Reduce false negatives and manual reviews.
Detect and stop account takeover attempts in real-time to proactively protect genuine users
Security flows are configured to identify any action that differs from the user's registered defaults. At this point, passive authentication takes place, where the user does not perform any re-authentication. These include:
If any of the information verified in the first step differs, an active user authentication process begins, which can be:
Based on the results of the previous steps, approve the user's action or stop intruders and protect your real user.
The Device Fingerprint method can help fight fraud by blocking Pix transactions to ensure compliance with Normative Instruction No. 147 of the Central Bank.
If a fraudster tries to log in with another device and/or repeatedly fails to enter a password, the anti-fraud system identifies the activity and requests a facial authentication with proof of life to confirm the user's identity.