ThreatMetrix Room for Improvement

Don Onwunumah
Senior Architect at Naakuu Ltd. UK
SDK is probably where the biggest issue is. The SDK configuration is a bit lacking. If you are integrating it into your workflow, it is very cumbersome and very difficult to integrate. You have to understand and be an expert in low-level mobile applications to integrate this stuff. Integration should be easy based on what they are providing, but unfortunately, it is not. It is very difficult. My work has been trying to simplify the integration process because integrations bring a lot of value. Most companies don't see their value because it is such a difficult process. For integration, you have to get it right as well, but it is very difficult to get it right because they don't help you in tuning your future parameters. Because of this, it is very difficult to tune your future parameters and your risk score. If you are Uber, your risk score will be very different from a banking client that is pushing funds. These two things need to be improved for me. The rest is pretty good. View full review »
Senior Manager at a insurance company with 10,001+ employees
There are no real pain points for us. One limitation is it only maintains six months' worth of data. It would be nice if it went back even further to help us really identify and flush out patterns that go on longer. I wouldn't say it's a pain point, however, it would be a nice feature and a nice enhancement of the tool. It would be great if there could be a streamlining of the case management process. If we identify a device that we're concerned about, what we'd like to do is if that device comes into our network, that we would automatically route it into our case so that we would know immediately that the device of concern has reappeared. Right now, you have to manually do that and it would be good if that could be automated. View full review »
Lead Android Developer at a financial services firm with 10,001+ employees
We are only using one feature. We haven't found the other features to be very good or very powerful. We'd like more tools that could help notify us as to if something is happening. The solution is providing a similar feature, however, it's not powerful enough. It doesn't really capture the threats as we'd like it to. It's like root detection. Anyone can compromise it. There should be an entire package that helps protect our users, instead of just one good feature. Currently, we have to use another tool to cover its shortcomings. View full review »
Learn what your peers think about ThreatMetrix. Get advice and tips from experienced pros sharing their opinions. Updated: November 2020.
448,076 professionals have used our research since 2012.
Product Owner at a tech services company with 501-1,000 employees
As much as I liked the rule engine, I would say that I didn't find it particularly intuitive. Thankfully, we had good engagement managers who walked us through what the fields meant, as it wasn't immediately obvious. There wasn't a clear mapping or description of these fields so that could be improved. We had to create an internal dictionary for distribution to users of the platform. While there were lots of data points, which was a positive, it was also somewhat of a negative. When you have 125 fields, it can be an overload of data that makes it difficult to know which are valid and useful. ThreatMetrix relied on us to understand some of that intelligence, but that's not our expertise. More understanding of which fields would be applicable for our use case, and that kind of collaboration, would have been helpful. You learn it over time anyway, but it creates challenges when setting up. I think the solution has some way to go in terms of its user-friendly nature, and in terms of some of the dashboards and metrics that it provides. In terms of some of the out of the box functionality, it would be good if there were some out of the box rules set up. We worked with the engagement manager to set it up, but having options would have been better. View full review »
Payment Solutions Architect at a computer software company with 11-50 employees
I'm not sure if I could answer questions about limitations accurately. Our implementation of it could definitely have used some improvement, however, that was a limitation on our part rather than on the part of the product. The initial setup is a bit difficult. During our implementation, we chose not to do a real-time integration. The integration was more of a batch asynchronous process. That could have been improved to make it more real-time. I'm not aware of any areas in which the product needs to be improved. The solution could be more powerful. It would be useful if they could offer real-time processing. There could be more features similar to what eCertify offers. View full review »
Learn what your peers think about ThreatMetrix. Get advice and tips from experienced pros sharing their opinions. Updated: November 2020.
448,076 professionals have used our research since 2012.