Last Updated: 04 July 2024 | Change Log
Device Data Collection
When combined with order and transaction details, device data (IP Address, Device Id, Geolocation Information, etc.) can be a strong indicator for fraud or used via GeoIP lookup to create manual rules based on location. Utilizing device data with Access Exemptions is a two-step process. Step one is to collect the device data. Step two is to submit an assessment that will use the device data for evaluation.
What is ThreatMetrix?
ThreatMetrix is a threat detection platform which provides historic context that helps detect user accounts being misused in real time. It builds a comprehensive digital identity to authenticate each connecting user by combining information related to device, anonymized identity information, behavior patterns and threat intelligence.