E-HAWK Adds Device Fingerprinting to Fraud Detection Service

January 27, 2014

Protect your business from online fraud and abuse using device fingerprinting linked to over two hundred tests on user profile and history.

Saratoga Springs, NY (PRWEB) January 27, 2014

E-HAWK (http://www.e-hawk.net) today added advanced device fingerprinting as part of their Online Vetting Platform and API, giving clients enhanced levels of protection against fraudulent activities, registrations, and account hijacking.

The fingerprint is linked to risk level analysis of user data including IP, email address, phone, location information, domain, activity and frequency monitoring, geo-location analysis, and community data throughout E-HAWK's network of clients.

"We are seeing a lot of bad actors jump between services using similar data patterns," said Peter Cholnoky, E-HAWK CEO. "Our device fingerprinting automatically marks these users as very high risk and keeps them out of systems permanently."

The vetting engine analyzes user risk and data by running over two hundred tests and returns a Risk Score and Risk Type – from Lowest Risk to Very High Risk. The unique device fingerprint is connected to the Risk Score value. If the fingerprint has a positive average, the risk level is reduced. If the fingerprint has a negative average, the risk level is elevated and customers can quickly take the necessary action.

Adding the fingerprinting technology to any web form is a simple JavaScript include. The fingerprint does not run any plugins on the client device, and is totally transparent to the end user experience. No personal identifiable information is associated with a device or fingerprint.

E-HAWK offers free accounts with a limited number of API calls per month.

About E-HAWK

E-HAWK provides an online service designed to stop fraudulent sign-ups, registrations, and account hijacking. The company has processed over five million risk evaluations and identified over 500,000 high-risk users. The technology integrates into any online service and runs over two hundred tests on IP, email, phone, location, domain, activity, geo-location, and device. In addition, submitted bad actor data from our customers is pooled and used anonymously in community testing to stop repeat cyber criminals from inflicting damage on multiple accounts.

For the original version on PRWeb visit: http://www.prweb.com/releases/2014/01/prweb11520328.htm

Source: prweb

comments powered by Disqus