ID Network Attributes provides insight into identity risk
Posted on 20 March 2013.
ID Analytics launched ID Network Attributes, targeted consumer behavior insights that provide visibility into the risk of an identity or transaction.

Available in both Fraud and Compliance & Verification bundles, ID Network Attributes provide companies with the information required to drive rule-based systems, enhance custom models and improve the accuracy and efficiency of manual reviews.

ID Network Attributes deliver real-time insights directly from the ID Network, one of the nation's largest networks of cross-industry consumer behavioral data. The ID Network is constantly updated, covering nearly 100 percent of the U.S. adult population and processing 45 million new identity element updates per day for an up-to-the-minute perspective on the risk of an identity or transaction in the marketplace.

"As identity risk challenges continue to evolve, striking a balance between risk management and an excellent consumer experience has become a moving target," said Garient Evans, director of Identity Risk Solutions, ID Analytics. "ID Network Attributes address this challenge, providing leading organizations with sophisticated data assets to effectively mitigate fraud, assess compliance, reduce friction and verify identities."

Benefits include:

Manual review enhancement - ID Network Attributes increase the effectiveness of a company's manual review process by providing details into prospective fraud and compliance risk.

Rule-based strategies - ID Network Attributes are used to improve fraud, compliance and verification scorecards, decision trees and workflow processing strategies.

Custom Model Input - ID Network Attributes deliver significant, incremental predictive performance as a model input.

"In today's challenging credit environment, financial institutions need to assess not only the credit worthiness of applicants but also the risk of fraud at issuance and throughout their relationship," said Jason Malo , research director, CEB TowerGroup. "Fraud management strategies must be informed by an understanding of identity at a level of granularity beyond the individual, to include the history of singular attributes they use to identify the person."





Spotlight

Bash Shellshock bug: More attacks, more patches

Posted on 29 September 2014.  |  As vendors scramble to issue patches for the GNU Bash Shellshock bug and companies rush to implement them, attackers around the world are probing systems for the hole it opens.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //