28 April 2019|2fA, Adaptive Authentication, Canvas, Device Recognition, Device Reputation, Hacking, IP Reputation, Malicious, Nation State, Threat
Interaction with consumer services, SAAS apps and web sites occurs from a variety of devices. Most households utilise mobile, desktop, tablet and laptop devices during their interaction on the web.
As a result, the use of device has become the starting point for an Identities digital fingerprint. Using key characteristics from a device, we can begin to recognise devices as these interactions occur. During these interactions should evidence of anomalies and fraud occur, we can use device recognition and fraud signals to define a device reputation.
By providing a device reputation score, we can take decisions at the start of an Identities interaction with a service. In other words if a device has been seen to be involved in fraud or abuse across a fraud network, we can react to that device if it appears accessing a service ThreatPoint is protecting.
Typically device characteristics used as part of the recognition process include:
- Attempts to evade detection
- Geolocation anomalies
- GeoVelocity anomalies
- Proxy use
- Tor use
- IP Reputation
- Device attributes, from which we create a unique representation within the network
Please get in touch email@example.com if you wish to try our device reputation API.
Try the service here: https://threatpoint.co.uk/device-reputation