ThreatMetrix, a provider of technologies to help organizations thwart cybercrime, announced a new intelligence network containing threat data and information that can be used to identify transactions and Website visitors as potentially malicious.
The new ThreatMetrix Global Trust Intelligence Network is a repository of information that organizations can use to screen prior transactions and site visitors, as well as to authenticate customers and remote employees, ThreatMetrix said Wednesday.
The Network, as it is called for short, can analyze more than 350 million monthly website transactions and login access attempts for cybercriminal activity, such as spoofed browser settings, a proxy to hide one’s true location, or a past history of high risk behavior. The network can provide insight into both positive and negative behavior for devices and online personas using more than 400 billion data points, ThreatMetrix said.
The Network offers organizations with real-time screening for online visitors using collaborative intelligence culled from thousands of websites and transactions, according to the company. The Network analyzes “the context and insights of prior visitor behavior and how they relate to incoming transactions,” said Alisdair Faulkner , chief products officer of ThreatMetrix, in a statement. With the information, ThreatMetrix can “uncover telltale signs of fraudsters and hackers, including devices infected with malware, virtual private network (VPN) detection, Man-in-the-Browser (MitB) detection, phishing detection, bots and automated attacks,” Faulkner said.
Many existing authentication products put customers through a process that can feel intrusive, such as requiring additional personal information, or elaborate with multiple steps, to prevent fraudulent or risky transactions. ThreatMetrix designed the platform so that customers, employees, and other “safe visitors” are not “inconvenienced” while high-risk visitors are identified based on their behavior and blocked.
“Web fraud is the new spam problem of this decade, except it is more profitable and far more lethal to revenues, brands, business continuity and national security,” said Faulkner.
Even if the visitor spoofed the browser settings or used a proxy to hide the true location, the network can flag the visitor for additional scrutiny. The assessment is based on previous risky behavior, such as being associated with high-risk behavior across other networks, or is associated with an abnormal number of personas, ThreatMetrix noted.
“Instead of drowning underneath the weight of big data, ThreatMetrix customers can automatically pinpoint Web fraud and compromised users, while reducing friction for trustworthy visitors,” Faulkner said.
Faulkner said The Network addresses the need for increased cybersecurity measures as defined in the president’s recent Executive Order for “Improving Critical Infrastructure Cybersecurity” because it screens each transaction for risks.”The key takeaway from Obama’s Executive Order is that a collective threat, such as the threat to our nation’s infrastructure, requires a collective and orchestrated response,” he said.
More from Fahmida Y. Rashid
- Emissary Panda Hackers Get Selective in Data Heists
- Financial Firms Embrace Cloud With Encryption, Tokenization: Report
- United Airlines Hack Highlights Need for Improved Information Sharing
- CISOs Challenged in C-Suite: Report
- Cyber Attack on Power Grid Could Top $1 Trillion in Damage: Report
- Dyre Malware Gang Targets Spanish Banks
- Ex-employees Have “Easy” Access to Corporate Data: Survey
- Leaked Government Credentials Abundant on Public Web
Latest News
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
