Authentication

Proven Solutions for Fraud Detection

When it comes to transaction security, you need to defend customer data, enterprise data and your brand reputation. Most breaches that create sensational headlines center on stolen consumer data — but employee errors and internal fraud are just as damaging. We offer proven authentication solutions that can help keep your enterprise making the wrong kind of headlines.

A Comprehensive Security Strategy

We build our fraud detection solutions around three key steps: detect, defend and evolve. All three are critical, because simply knowing if you’ve been breached isn’t enough — and simply reacting to intrusions after the fact isn’t a winning strategy either.

Entrust Datacard Authentication

Detect

Robust detection of fraud is a vital first step in building a comprehensive solution. Our software provides real-time monitoring, automatic fraud detection, adaptive authentication features built on behavioral biometrics and non-invasive, user-notification methods. Integrated with the IntelliTrust authentication service, it’s creates an incredibly strong line of defense.

Entrust Datacard Authentication

Defend

It’s important to be proactive and establish strong protection for prime targets for intrusion. The most common target is compromised employee credentials. We offer a range of solutions for creating strong defense — including digital certificates, mobile device certificates and device reputation to identify when step-up authentication is necessary to mitigate an elevated risk scenario.

Entrust Datacard Authentication

Evolve

The threats you faced yesterday — even today — will be replaced with increasingly more sophisticated attacks tomorrow. Hackers are always working to outflank security technology. That’s why our IntelliTrust authentication platform is so effective. We integrate a variety of adaptive technologies to anticipate and defeat those increasingly sophisticated attacks.

Entrust Datacard Authentication

Adaptive Solutions for Mobile, Online Transactions

Adaptive authentication works in real-time analyzing background information that helps financial institutions assess whether those conducting online or mobile transactions are who they say they are. We use contextual data — such as mobile and PC device fingerprinting, geolocation, velocity analysis, device certificates and behavioral biometrics — to build real-time risk profiles.

Smart Authentication

Device Reputation Insights Improve Security and Reduce User Friction

Device reputation uses best-of-breed device identification, dynamic risk context, and analytics to transform static, single-factor authentication into multi-factor solutions. Device reputation recognizes and detects fraudulent behavior across all types of internet devices including desktop, mobile and tablets.

Keys to Identifying Fraud Patterns

Our authentication solutions are built to help you automatically detect fraud. Because they’re built on intelligent, adaptive technologies, our platform grows smarter and more capable over time — which helps defend against increasingly sophisticated attacks.

Hex

Device Anomaly Detection

Identifies time zone mismatches, IP address changes or exceeded velocity thresholds.
Hex

Evasion Detection

Flags the use of proxy servers or emulators that are employed by fraudsters to anonymize their activity.
Hex

Source Detection

Check for activity emanating from high-risk cocations, IPs and ISPs: recognizes high-risk situations that violate established business policy.

Mobile ID Proofing for Remote Onboarding

Mobile ID proofing lets you simply and confidently issue trusted identities to users. All that’s required is a mobile phone, internet connection and government-issued ID. Our platform verifies the user’s identity and document authenticity, then issues a new credential.

Simple 4-Step Approach for Mobile ID Verification

1. User initiates process by downloading the mobile app

2. Identity is captured through a selfie and photo ID image

3. Authentication services verify identity and device integrity

4. User is granted service or mobile credential.

Hex

Request a Demo

Request a demo with an IntelliTrust authentication platform specialist.

Our Products

Cloud-Based Deployment

IntelliTrust™

Secure your enterprise and give your users secure access to everything — applications, networks, computers, doors — with cloud-based multi-factor authentication.

View All

On-Premises Deployment

IdentityGuard™

Experienced security professionals in corporations, banks and government agencies know the name IdentityGuard and trust it to protect and enable what matters to them.

SMS Passcode™

SMS Passcode authenticates users by sending a real-time, session-specific one-time passcode (OTP) to the user’s mobile phone via SMS, app, voice-call or email.

Our Authentication
Technologies:

Entrust Datacard Authentication

Establish Trust

Streamline the onboarding of a wide range of users and devices with a wide range of technologies available in our platform.

Entrust Datacard Authentication

Enable Access & Transactions

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Entrust Datacard Authentication

Maintain Trust

Continuously protect against advanced threats with technology ranging from behavior analytics to fraud detection.