(4)
5.0 out of 5
Visit Website
Sponsored
Transaction Scoring | Based on 16 Fraud.net reviews and verified by the G2 Product R&D team. Rates each transaction's risk based on specific factors and their benchmarked scores. | 85% (Based on 16 reviews) | |
Risk Assessment | Based on 18 Fraud.net reviews and verified by the G2 Product R&D team. Flags suspicious transactions and either alerts administrators or declines transaction. | 85% (Based on 18 reviews) | |
Intelligence Reporting | Based on 16 Fraud.net reviews and verified by the G2 Product R&D team. Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. | 89% (Based on 16 reviews) | |
ID Analytics | Based on 15 Fraud.net reviews and verified by the G2 Product R&D team. Stores data from external or internal sources related to fake accounts, evaluating users for risk. | 86% (Based on 15 reviews) |
Fraud Detection | Based on 19 Fraud.net reviews and verified by the G2 Product R&D team. Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers. | 87% (Based on 19 reviews) | |
Alerts | Based on 17 Fraud.net reviews and verified by the G2 Product R&D team. Alerts administrators when fraud is suspected or transactions have been declined. | 87% (Based on 17 reviews) | |
Real-Time Monitoring | Based on 17 Fraud.net reviews and verified by the G2 Product R&D team. Constantly monitors system to detect anomalies in real time. | 85% (Based on 17 reviews) | |
Payment Verification | Requires verification of credit card, debit card, and money transfers prior to accepting payments | Not enough data | |
Bot Mitigation | Monitors for and rids systems of bots suspected of committing fraud. | Not enough data | |
Real-Time Monitoring | As reported in 13 Fraud.net reviews. Constantly monitors system to detect anomalies in real time. | 78% (Based on 13 reviews) | |
Alerts | As reported in 11 Fraud.net reviews. Alerts administrators when fraud is suspected or transactions have been declined. | 76% (Based on 11 reviews) |
Device Tracking | Based on 13 Fraud.net reviews and verified by the G2 Product R&D team. Keeps records of geographic location and IP addresses of fraud suspects. | 90% (Based on 13 reviews) | |
Fraud Markers | Based on 14 Fraud.net reviews and verified by the G2 Product R&D team. Tags users suspected of committing fraud and identifies them upon return. | 85% (Based on 14 reviews) | |
Blacklisting | Based on 14 Fraud.net reviews and verified by the G2 Product R&D team. Prevents previous committers of fraud from future transactions. | 79% (Based on 14 reviews) | |
Bot Mitigation | Based on 11 Fraud.net reviews and verified by the G2 Product R&D team. Monitors for and rids systems of bots suspected of committing fraud. | 77% (Based on 11 reviews) |
ID Analytics | Stores data from external or internal sources related to fake accounts, evaluating users for risk. | Not enough data | |
Intelligence Reporting | Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to payments and fraud. | Not enough data |
Fraud Markers | As reported in 11 Fraud.net reviews. Tags users suspected of committing fraud and identifies them upon return. | 74% (Based on 11 reviews) | |
Transaction Scoring | Rates each transaction's risk based on specific factors and their benchmarked scores. This feature was mentioned in 12 Fraud.net reviews. | 81% (Based on 12 reviews) | |
Blacklisting | Prevents previous committers of fraud from future transactions. This feature was mentioned in 13 Fraud.net reviews. | 81% (Based on 13 reviews) |
Name Matching | The solution uses intelligent algorithms like fuzzy matching to identify potential risks. | Not enough data | |
Watch List | Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity). | Not enough data | |
Scoring | Score persons and organizations based on their history and risk potential. | Not enough data | |
E-filing | Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms. | Not enough data | |
Workflows and Alerts | Standard workflows to assign workload and to alert users based on predefined triggers. | Not enough data |
Due Dilligence | Manage due dilligence processes such as Customer Due Diligence and Know Your Customer. | Not enough data | |
Regulations and Jurisdictions | Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA. | Not enough data | |
Internal Policies | Compliance with fraud and risk management policies created by the company using the solution. | Not enough data |
Models | Create behavior models that can be used to detect suspicious behavior. | Not enough data | |
Simuation | Simulate and validate scenarios to address multiple types of risks. | Not enough data | |
Transaction Monitoring | Real-time transaction screening to immediately identify potential risks. | Not enough data | |
Segmentation | Allows users to segment and manage lists of suspicious persons and organizations. | Not enough data | |
QA | Evaluate the quality and performance of the anti-money laundering activities. | Not enough data |
Compliance Reports | Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT. | Not enough data | |
Suspicious Activity | Display suspicious activity by period, risk type, person or organization. | Not enough data | |
Real-Time Dashboards | Dashboards to provide real-time data on suspicious transactions, persons, or organizations. | Not enough data |
Risk Scoring | Has integreated AI features to assess and assign risk scores to transactions and customer profiles, enabling prioritized investigations based on potential threat levels. | Not enough data | |
Pattern Recognition | Uses AI algorithms to identify complex patterns and anomalies in transaction data that may indicate money laundering. | Not enough data |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |