KOUNT COMPLETE™ - PRODUCT OVERVIEW
Kount is a strategic approach to fraud/risk management. Kount Complete provides an all in one fraud management solution to help you prevent fraud before it occurs.
KOUNT COMPLETE OVERVIEW
Kount Complete provides a single, turnkey fraud solution that is easy-to-implement and easy-to-use. The all-in-one, Kount Complete platform is designed for businesses operating in card-not-present environments, simplifying fraud detection and dramatically improving bottom line profitability.
Merchants who use Kount can accept more orders from more people in more places than ever before.
MULTI-LAYER DEVICE FINGERPRINTING™
Kount's Multi-Layer Device Fingerprinting™ collects a comprehensive set of data that positively identifies a device in real time— whether fixed or mobile. The key to maintaining a device's ID is to analyze customer behavior associated with device and collect additional device parameters not typically accessible by other device ID technologies. Most importantly, Multi-Layer Device Fingerprinting™ does all this without retrieving the user's Personally Identifiable Information (PII).
The Proxy Piercer® feature combats fraudsters who use proxy servers to hide their actual location. Typically, the location of anyone accessing the Internet can be identified via the IP address assigned to their computer by their Internet Service Provider. A proxy server is used as an intermediary device to disguise a geographic location that is associated with high fraud activity. Proxy servers are used because a fraudster conducting a stolen credit card transaction wants to appear to be in the same location as the owner of the stolen card.
The Persona™ feature is a method of determining key characteristics and identified qualities/attributes associated with a transaction. Persona uses hundreds of variables to construct a definitive link to online purchase behavior—either directly or indirectly—to help reveal fraudulent activity. This process takes less than one second to provide merchants with highly accurate fraud assessments in real-time.
DYNAMIC SCORING & RESCORING
The Dynamic Scoring™ feature monitors a credit card for signs of fraudulent activity even after a transaction has been approved. This “post-authorization” process has proven highly successful at spotting suspicious activity and retroactively tying that activity to previous purchases. The Kount Complete™ system then alerts the merchant that a previously-approved order now looks to have relevant connections to fraudulent activity. The merchant can re-evaluate the order and decline to ship— avoiding the loss of the goods while also preventing the expense of a chargeback.
KOUNT FRAUD SCORE
The Kount Score feature provides merchants with more predictive control and customization in the way they manage their fraud risk. This feature meets a key requirement identified in Gartner's 2010 Magic Quadrant for Web Fraud Detection:
Users want...a mathematically predictive scoring system that runs in parallel with the rules. Users can more easily set thresholds with predictive model scoring systems than they can with rules-based systems alone to enable them to better adjust their false-positive and transaction review rates.”
MANUAL REVIEW AUTO AGENT
The AutoAgent feature in the Kount Complete™ solution features a powerful rules engine that enables administrators and risk assessment managers to create custom rules for orders with specific characteristics. When an order enters the merchant's system that has one or more of these characteristics, it is automatically routed for AutoAgent review and disposition. AutoAgent can then apply additional tests, processes and/or profiles and reach a decision to approve, review, decline, or escalate—without the need for intervention by a human risk assessment agent.
BUSINESS INTELLIGENCE REPORTING
The Kount Complete™ solution provides a robust set of reporting tools that can be accessed by administrators and managers to view agent, workflow, and financial data. These reports allow the monitoring of overall order traffic through the Kount Agent Web Console. Additional reports can be run to ensure the security of your application, such as login attempts and configuration setting changes. These powerful reporting capabilities and comprehensive management screens of the Kount Complete™ solution help maximize productivity, while ensuring system integrity and security.
THIRD PARTY DATA CALLOUTS
The Kount Complete™ solution integrates data services from leading providers to facilitate smooth, seamless operations—without having to leave the Kount interface. This Integration of third-party evaluation and assessment services within Kount provides merchants with a superior level of fraud detection within a single, on-screen view. When necessary, merchants may choose to use one or more of these third-party services to enhance their ability to more quickly review and validate transactions.
ENTERPRISE WEB SERVICES
Kount Enterprise Web Services provide the maximum protection for the merchant while minimizing the impact of managing fraud prevention. These services provide merchants with external resources that help them maintain and enhance their Kount Complete™ solution. Kount's risk analysis department works with the merchant's risk managers, augmenting the merchant's experience to develop effective anti-fraud strategies that optimize the Kount Complete anti-fraud solution.
The Agent Workflow Console helps increase operational efficiency and reduces the cost of manual reviews. This feature addresses one of the largest fraud prevention costs for merchants: the training and maintenance of human risk assessment agents to manually review orders. Using a pattern-based rules engine and auto-decision routines, the Agent Workflow Console feature enables superior operational efficiencies when reviewing transaction activities, evaluating risk, and managing human assets.
Merchants often use affiliates and affiliate networks for marketing products and services. Unfortunately, affiliates can engage in fraudulent activity in order to “earn” commissions from the merchant without actually fulfilling their responsibility to direct valid customer traffic to the merchant's website and the desired product page. Sites that offer “free trials,” or that require an application to be completed before the transaction can be submitted, are especially vulnerable to fraud due to the delay in the actual sale.
MOBILE DEVICE ANALYSIS
Most merchants look at mobile commerce as a new and exciting way to allow customers to buy products without sitting in front of a PC. Rapid growth of mobile devices globally though, has opened new doors for fraudsters. Fraudsters now have more ways to access goods and services, mask themselves, and attempt to steal from merchants. Unlike other forms of payment, mobile devices introduce many new elements that complicate the user verification process. Stolen mobile devices are as vulnerable as stolen credit cards and other forms of identification.
Workflow management is an important factor that ensures the efficient and effective processing of orders flagged for review. Based on established rules, Kount’s Workflow Queue Manager quickly sends suspect transactions to the most appropriate review agent for a convenient and appropriate resolution. The Workflow Queue Manager recognizes each rule’s assigned priority so that the most important transactions are processed first. Transactions waiting to be resolved can also be escalated to top priority based on other factors including “time in queue” and many others.
HOW KOUNT COMPLETE HELPS YOU...
The interlocked integration of Kount’s core technology makes it possible to more quickly and accurately detect fraud. Our proprietary techniques analyze hundreds of variables resulting in a highly predictive Kount Risk Score.
Kount helps create and manage a fraud strategy that dovetails with your business needs. Customize how Kount processes transactions based on your specific business rules.
Comprehensive support and best practices to maximize operational efficiency. A simple way to manage the flow of transactions through the system, interact with risk managers and critical business systems.