ThreatMetrix Overview

ThreatMetrix is the #1 ranked solution in our list of Fraud Detection and Prevention software. It is most often compared to iovation FraudForce: ThreatMetrix vs iovation FraudForce

What is ThreatMetrix?
ThreatMetrix Digital Identity Network constantly identifies fraudsters from trusted customers by analyzing more than 850 transactions each second of every day. It defends against data breach and credential testing from bots designed to mimic human behavior and evade detection by web application firewalls and integrates fraud and risk data across the enterprise with behavioral information on more than 1.4 billion digital identities for smarter, faster and better risk decisioning.
ThreatMetrix Buyer's Guide

Download the ThreatMetrix Buyer's Guide including reviews and more. Updated: January 2021

ThreatMetrix Customers
Trip Advisor, Stone Hub, TD Bank, Rabobank, GoPro
ThreatMetrix Video

Pricing Advice

What users are saying about ThreatMetrix pricing:
  • "I am not aware of the price. I have always come in after it has been negotiated. The clients do get a return on their investment. It mitigated a massive DDoS, and it definitely detects fraudulent activities on banking platforms. They have definitely got their ROI back because there is continued investment in ThreatMetrix over time."

ThreatMetrix Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Don Onwunumah
Senior Architect at Naakuu Ltd. UK
Real User
Oct 19, 2020
It has a huge database of malicious IP addresses and gives a score for your environment

What is our primary use case?

I was initially responsible for deploying this solution, and after that, I have done development for three major clients. I initially started using ThreatMetrix in an anti-fraud mobile application for detecting fraud. It was a mobile wallet, and I was responsible for the API in the mobile team, which was responsible for deploying it out in the field. The way ThreatMetrix works is that it has a corresponding mobile SDK and web service in the backend. My team was responsible for deploying it to effectively integrate it into the platform for the client. We started using this solution because the… more »

Pros and Cons

  • "The most valuable thing is about the IP. They have a database of malicious IP addresses against which they check. They have a huge database for routed devices and the devices that have been used in the past to commit fraud. They have extensive historical records of all of that information, and that's probably the most valuable thing about ThreatMetrix. Over the years, they have been collecting and persisting globally across all the banking and financial services. They have been storing all this information. It is this stored information that I and my team find valuable; it is not so much their technology. If you are running it on a simulator and trying to maliciously clone and copy IP addresses and stuff like that, they have a bunch of technologies, like routes section and all the other stuff. It is just that they have something that no one else can deal with, that is, massive amounts of big data about the malicious IP addresses, malicious device fingerprinting, the fingerprinting router devices, and the fingerprints. You can query against this stored information to find out whether your app is in a good, nice environment. If yes, you get a green light. The last time I checked, there were about 400 or 500 features that they can stack against, which is pretty extensive. They give you a score against all those features for every application that you installed on it. It is pretty good in that sense."
  • "SDK is probably where the biggest issue is. The SDK configuration is a bit lacking. If you are integrating it into your workflow, it is very cumbersome and very difficult to integrate. You have to understand and be an expert in low-level mobile applications to integrate this stuff. Integration should be easy based on what they are providing, but unfortunately, it is not. It is very difficult. My work has been trying to simplify the integration process because integrations bring a lot of value. Most companies don't see their value because it is such a difficult process. For integration, you have to get it right as well, but it is very difficult to get it right because they don't help you in tuning your future parameters. Because of this, it is very difficult to tune your future parameters and your risk score. If you are Uber, your risk score will be very different from a banking client that is pushing funds. These two things need to be improved for me. The rest is pretty good."

What other advice do I have?

I would say to definitely consider it at a design stage, or at least to have an extensive sandbox where you can set it out. The major thing is integration into your current system and also false positives from poorly configured systems. If you actually do have a system that is already running, then definitely look at the integration and look at the knowledge base to understand exactly what it takes and how do they integrate. It is not just integrating the SDK or the API in the product; it is understanding the massive parameters that you can tune. ThreatMetrix helps you with that aspect, but it…
reviewer1454883
Senior Manager at a insurance company with 10,001+ employees
Real User
Nov 17, 2020
Stable with a good interface and offers excellent event reports

What is our primary use case?

We're using the solution to help us identify scenarios where the same device is appearing to purchase multiple policies from us. There are two scenarios of what that entails. Number one is ghost brokering. The second is identity theft. The scenario would be, I steal your identity, and I come to our website, where I purchase a policy in your name. What doesn't make sense is why would two different people, looking at two different addresses, be using the same device? That's the scenario we're concerned about.

Pros and Cons

  • "The user interface, the portal, is very helpful in describing what attributes of concern are associated with the device."
  • "One limitation is it only maintains six months' worth of data. It would be nice if it went back even further to help us really identify and flush out patterns that go on longer."

What other advice do I have?

We're using the web version. I'm not aware of if they have multiple versions. I would recommend the solution to others. I would tell potential users that it's important to provide ongoing feedback to ThreatMetrix as to the outcomes. That will help them further refine the tool. If you don't have a commitment to providing the feedback loop, my guess is it would be less successful. One of the reasons we've had success is that we've been providing information back on the outcomes, which helps them fine-tune the model and improve on it from that perspective. Overall, I would rate the solution ten…
Learn what your peers think about ThreatMetrix. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
457,209 professionals have used our research since 2012.
reviewer1458501
Lead Android Developer at a financial services firm with 10,001+ employees
Real User
Dec 13, 2020
Great technical support, good integration capabilities and offers good documentation

What is our primary use case?

We have a mobile application for Android and iOS. We just want to know that the application installed on the mobile device is good or not. If some hacker is installing the application or the application is installed on compromised device, we should know this so we can block it.

Pros and Cons

  • "There is excellent documentation available."
  • "We are only using one feature. We haven't found the other features to be very good or very powerful."

What other advice do I have?

I'm not sure which version of the solution we are using. It may be some variation of version five. The solution in terms of implementation is pretty good and it can be a fairly simple deployment. It seems complex at first, however, it's very, very simple and the documentation is fairly good. That said, we thought we would be getting more benefit and only later realized some areas are not as robust as we had thought. In terms of our requirements for device detection, I'd rate the solution a nine out of ten.
reviewer1455063
Product Owner at a tech services company with 501-1,000 employees
Real User
Nov 18, 2020
Great custom rules engine; could be more intuitive and user friendly

What is our primary use case?

Our primary use case for ThreatMetrix was for our device intelligence, to help us with our fraud detection and monitoring capabilities. This is primarily for our lending products, so a supplier driven lending product. We were customers of ThreatMetrix.

Pros and Cons

  • "Accessible custom rules with a monthly update on performance."
  • "Could be more intuitive and user friendly."

What other advice do I have?

ThreatMetrix seems like a fairly complete solution. Because of the rise of mobile, we were moving to a mobile based lending product. Given that fact there was a concern that there was a new vector for attack and that's what we wanted to protect ourselves against. It's important to understand your use case very clearly. I think the challenge we had was the understanding that this was a capability that we needed, but we were not particularly clear as to how extensively we would use it. That's worth figuring out in advance. You can access the admin console and view performance once it's been…
reviewer1453053
Payment Solutions Architect at a computer software company with 11-50 employees
Real User
Nov 20, 2020
Offers good stability and accurate fraud assessments but needs better integration capabilities

What is our primary use case?

The solution is used for fraud assessment of credit card transaction processing in a retail environment. That's the main thrust of it. Basically, it's a fraud assessment tool.

Pros and Cons

  • "The most valuable feature the solution has is that it is able to do a fairly accurate fraud assessment of a credit card transaction based on a variety of parameters configured by the merchant."
  • "It would be useful if they could offer real-time processing."

What other advice do I have?

I would suggest that a potential new customer that's in the market for such a product get quotes from the top three or four players. These would be ThreatMetrix, Kount Retail Decisions, eCertify, and CyberSource. Those are the main fraud assessment platforms that I'm aware of. Fraud assessment is a good thing for merchants to implement. Fraud, in general, in the transaction processing space, is a big issue and becoming larger as the years go by. I would advise merchants to do engage with such fraud assessment tools as ThreatMetrix. Overall, I would rate the solution seven out of ten. It's not…
Buyer's Guide
Download our free ThreatMetrix Report and get advice and tips from experienced pros sharing their opinions.