Fraud Detection
A comprehensive security strategy
Most breaches that create sensational headlines center on stolen consumer data — but employee errors and internal fraud are just as damaging. We build our fraud detection solutions around three key steps: detect, defend and evolve. All three are critical, because simply knowing if you've been breached isn't enough — and simply reacting to intrusions after the fact isn't a winning strategy either.
Keys to identifying fraud patterns
Our authentication solutions are built to help you automatically detect fraud. Because they're built on intelligent, adaptive technologies, our platform grows smarter and more capable over time — which helps defend against increasingly sophisticated attacks.
Device Anomaly Detection
Identifies time zone mismatches, IP address changes or exceeded velocity thresholds.
Evasion Detection
Flags the use of proxy servers or emulators that are employed by fraudsters to anonymize their activity.
Source Detection
Check for activity emanating from high-risk locations, IPs and ISPs: recognizes high-risk situations that violate established business policy.
Strong security and exceptional UX
We offer a full range of authentication capabilities that will empower your users to access services and verify transactions, knowing their assets and information are completely secure. Our methods include:
Adaptive Authentication
Add seamless security for your customers by assessing contextual attributes in real-time.
Device Reputation
Device reputation recognizes and detects fraudulent behavior across all types of devices.
Identification Proofing
Digitally validate the users identity and device before issuing a credential.
Secure, frictionless onboarding
Request a demo today
An Entrust Identity portfolio specialist will be in touch with options soon.
Identity Portfolio
Identity as a Service
High assurance cloud-based workforce and consumer authentication. Credential-based access including passwordless authentication with unified SSO.
Identity Enterprise
High assurance workforce and consumer authentication. Credential-based authentication including physical smart card issuance. On-premises solution.
Identity Essentials
Best-in-class MFA and VPN protection for Windows-based workforces.
Our identity portfolio capabilities:
Authenticate
Authorize
Transact and Manage
The identity portfolio suited to your authentication needs
- Consumer
- Workforce
- Citizen
Consumer
Consumer Banking
Attract and retain customers with best-in-class mobile and online banking services.
Customer Portals
Give customers frictionless access to your portals—and build a great brand experience.
CIAM Integration
Our portfolio integrates seamlessly with your Customer Identity Access Management (CIAM) strategies.
Meet PSD2 Regulations
We have the trusted identity tools you need to be successful and in compliance.
Workforce
Physical/Logical Access
Our portfolio offers the necessary technologies to integrate physical and logical secure access.
Safeguard VPN
Empower workers everywhere with always-on access to VPNs and SaaS applications.
Privileged Worker
Protect the critical application credentials of system administrators or senior leaders.
Passwordless Login
Get a true passwordless SSO solution that supports all devices, PCs and Macs, and cloud and on-premises apps.
Contractors
Our solutions ensure application security for contractors using on-prem or cloud apps.
Enable PIV Compliant Government Mobility
Remove complexity and enable highly secure mobility with proven PIV solutions.
Citizen
Digital Citizen
Use our portfolio to secure and manage passports, national ID's and driver's licenses.