Site Loader

28 April 2019|2fA, Adaptive Authentication, Canvas, Device Recognition, Device Reputation, Hacking, IP Reputation, Malicious, Nation State, Threat

Interaction with consumer services, SAAS apps and web sites occurs from a variety of devices. Most households utilise mobile, desktop, tablet and laptop devices during their interaction on the web.

As a result, the use of device has become the starting point for an Identities digital fingerprint. Using key characteristics from a device, we can begin to recognise devices as these interactions occur. During these interactions should evidence of anomalies and fraud occur, we can use device recognition and fraud signals to define a device reputation.

By providing a device reputation score, we can take decisions at the start of an Identities interaction with a service. In other words if a device has been seen to be involved in fraud or abuse across a fraud network, we can react to that device if it appears accessing a service ThreatPoint is protecting.

Typically device characteristics used as part of the recognition process include:

  • Attempts to evade detection
  • Geolocation anomalies
  • GeoVelocity anomalies
  • Proxy use
  • Tor use
  • IP Reputation
  • Device attributes, from which we create a unique representation within the network

Please get in touch info@threatpoint.co.uk if you wish to try our device reputation API.

Try the service here: https://threatpoint.co.uk/device-reputation

Post Author: wpress

Leave a Reply

error

Enjoy this blog? Please spread the word :)

Follow by Email
YouTube
YouTube