FRAUD DETECTION

Silently detect suspicious logins so real customers can zip right through

Fraud detection

In real life it’s easy enough to spot suspicious behavior. Doing that online is tougher. You need to know what “unusual” activity looks like. It could be the time, location or device from which someone is trying to login. Strivacity checks all that 24/7 so you can block suspicious users or trigger additional authentication.

Benefits

Avoid threats

Prevent fraud and account takeover (ATO) incidents

Simple journeys

Keep sign-in friction low for your real customers

Built with intel

Evaluate user activity against the latest 3rd party threat intel

How it works

All of our fraud detection capabilities are configured with drop-down menus and on/off buttons in our admin interface. When the Strivacity fraud engine detects a potential imposter the customer is prompted to re-authenticate with MFA.

Don Assalone, Director of Global Cybersecurity

"Security is in Strivacity's DNA. That combined with the fact Strivacity was so easy to deploy and scale up convinced us they were the best solution."

Erica Tessier Hunt, VP Corporate Marketing

“I can’t emphasize the power of Strivacity's people enough. Throughout this entire process, it has been a partnership. We are not just a client, we are partners."

The Forrester WaveTM: Customer Identity And Access Management Solutions, Q4 2024

"Customers said that they need strong reporting and dashboarding capabilities in a CIAM solution to be able to justify investment and get business value."

Strivacity Logo

How we’re different

Configure all fraud detection rules with clicks (not code)

Multiple techniques for networks, devices and behavior analysis

Machine learning identifies what’s “normal” for each customer

Strivacity Risk Engine™ continuously evaluates risk

a purple background with white squares

Key capabilities

We use the most up-to-date 3rd-party threat intel from multiple sources and combine it with the Strivacity Risk Engine to ensure you’re keeping obvious bad actors at bay and evaluating every login to flag suspicious activity.

Trusted network and device detection

Evaluate the devices and networks customers use to sign in. Strivacity evaluates them against the latest 3rd party threat intel. If they look risky you can block the sign-in or ask the user to re-establish trust by authenticating with multi-factor authentication (MFA).

Behavioral analytics

The Strivacity risk engine uses machine learning to determine what “normal” behavior looks like for each customer. Then, when the location or time of day/week look odd, you can step up security and prompt the customer to authenticate with MFA.

Bot detection

Let your customers skip the Captcha clicks. Strivacity uses the latest intel on known bots, anonymous proxies and known Tor exit nodes so you can automatically block them when they try to sign in.

Fraud detection features

Customer insights features

Feature

How it works

Trusted networks and device detection

Trusted devices

Allows customers to “remember” their device as long as you want. 3rd party integrations like Deduce let you check against 3rd party device trust data.

Trusted networks

Configure Strivacity to block connections or step up security from any IP addresses or networks.

Breached passwords

All passwords are checked at login against a constantly-updated database of known breached passwords.

Risky phone number detection

Restricts phone numbers frequently used by bad actors like non-fixed VoIP and 1-800 numbers.

SIM swap detection

Rejects phone numbers that have recently been switched from one device to another so bad actors can’t use stolen phone accounts.

Behavioral analytics

Location

Uses machine learning to step up security and require MFA when a customer’s login time of day or day of week is unusual.

Time of day / week

Assign customers to different groups manually or dynamically so you can personalize their experience.

Bot detection

Bot detection

Checks login and registration request to see if it’s associated with known bot activity and then block the login attempt.

Anonymous proxies / Tor

Steps up authentication if an IP address is associated with known anonymous proxies or Tor exit nodes.

Email and physical address risk

Email address

Validates email address authenticity, including syntax checks, domain verification, and cross-referencing with reliable third-party marketing databases.

Physical address

Validates physical address and detects suspicious patterns, such as addresses linked to businesses, vacant properties, or prisons.

B2B Identity

See more

Customer Insights

Get instant visibility into sign-ups, sign-ins, and security

See more

AI Assist

Get identity answers fast with your own Generative AI (GenAI) assistant

See more

Customer experience canvas

Create customer sign-in experiences that look and feel like your brand

See more

Lifecycle event orchestration

Keep your customers’ data in synch with your CRM, MarTech stack and custom apps

See more

Consent Management

Create, update and add consents into your sign-in journeys

See more

Identity verification

Verify customer IDs by checking telco records, document verification or knowledge-based verification

See more

Fraud detection

Flag bots and suspicious logins by analyzing device and customer activity

See more

Adaptive access controls

Pick the ways for customers to authenticate — MFA, Social login, SSO, biometrics or passwordless

See more

Registration & self service

Make it a breeze for customers to sign-up, sign-in and manage their account

See more

Does this sound familiar?

Manual B2B workarounds

Behind-the-scenes emails, spreadsheets and approvals that lead to delays and dead ends.

Minimum viable experiences

A B2B customer experience that checks the box but falls short of customer expectations.

Endless engineering queues

New features, fixes and upgrades to your B2B sign-in experience that sit for weeks and months.

1-800-HELP-ME

Internal and customer requests to customer support to create and update B2B accounts.

Support for all B2B models

B2B sign-in scenarios can vary quite a bit across different industries and business models. We support all of the major types of B2B models including hybrid models:

B2B

For organizations whose customers are other businesses

  • Example: Manufacturing

B2B2C

For organizations who serve their customers through third-party agents or partners

  • Example: Insurance

Hybrid B2B + B2C

For organizations that have both business customers and individual consumers

  • Example: Energy utilities

What makes our B2B CIAM solution unique?

The capabilities that set us apart for B2C CIAM deployments (read them here) also make us the top choice for B2B CIAM deployments.

In addition, competitors can’t match us on these three critical capabilities that’re required for successful B2B deployments.

Strivacity logo
COMPETITORS
Organizations and roles designed for B2B

Drag-and-drop organization and group assignments to support any hierarchy or permission combo for B2B users.

Org assignments and roles must be hard coded since the org model wasn’t designed for B2B.

One platform for all B2B scenarios

Manage an unlimited number of B2B customers (and customer relationships) from one platform so you can create different customer journeys for different user populations.

Typically requires multiple instances to support different customer relationships and/or customer journeys.

Audit from one place

Centralized auditing of all changes and user activity lives in one place so audits and compliance a breeze.

Audits typically require following bread crumbs and swiveling between multiple products and interfaces.