ThreatMetrix Valuable Features

Don Onwunumah
Senior Architect at Naakuu Ltd. UK
The most valuable thing is about the IP. They have a database of malicious IP addresses against which they check. They have a huge database for routed devices and the devices that have been used in the past to commit fraud. They have extensive historical records of all of that information, and that's probably the most valuable thing about ThreatMetrix. Over the years, they have been collecting and persisting globally across all the banking and financial services. They have been storing all this information. It is this stored information that I and my team find valuable; it is not so much their technology. If you are running it on a simulator and trying to maliciously clone and copy IP addresses and stuff like that, they have a bunch of technologies, like routes section and all the other stuff. It is just that they have something that no one else can deal with, that is, massive amounts of big data about the malicious IP addresses, malicious device fingerprinting, the fingerprinting router devices, and the fingerprints. You can query against this stored information to find out whether your app is in a good, nice environment. If yes, you get a green light. The last time I checked, there were about 400 or 500 features that they can stack against, which is pretty extensive. They give you a score against all those features for every application that you installed on it. It is pretty good in that sense. View full review »
Senior Manager at a insurance company with 10,001+ employees
The user interface, the portal, is very helpful in describing what attributes of concern are associated with the device. They created a related events report for us. What that does is it helps us quickly identify any time the same device is associated with three or more transactions that are seemingly not related. If it's the same household, we wouldn't be interested in that, however, if it's coming from different addresses, etc., that's where we become concerned. Those are the two most helpful features that we find. View full review »
Lead Android Developer at a financial services firm with 10,001+ employees
The most valuable feature for us is the fact that basically, we don't use paid metrics. We'd only use them for extensibility. We basically use it for device profiling and we just want to see if the device installed is correct or not. And if it is not correct, we don't allow them in there. We don't allow any kind of a standing order directive at any time. The integration is fairly simple. The solution has been stable over the two years we've used it. There doesn't seem to be any issues with scalability. Technical support was very helpful throughout the deployment process. There is excellent documentation available. They are very proactive in enhancing their product on a regular basis. View full review »
Product Owner at a tech services company with 501-1,000 employees
I liked the rules engine, the fact that there were custom rules that were accessible, that we then got an update every month in terms of how it was performing. It meant we could keep updating our rules and tweaking them to suit. Sometimes they gave false positives and sometimes we made them a bit too lax. It was quite easy to use and customize as we went through that journey. The other thing was that we had our own proprietary admin console, so we could easily consume the API and bring the data onto our custom application. It was easy to use and implementation was fairly quick. View full review »
Payment Solutions Architect at a computer software company with 11-50 employees
The most valuable feature the solution has is that it is able to do a fairly accurate fraud assessment of a credit card transaction. The rules used in fraud scoring can be based on many transaction attributes such as purchased IP address (country), amount, email address, etc. Scoring rules can be configured by the merchant. The accuracy in its assessment is the most important thing for such a tool. View full review »