blue hexagon

The Kount Difference

Kount enables contextual, risk-based authentication. Kount’s device and account intelligence analyzes digital risk signals along with account behaviors to ascertain the appropriate response—frictionless authorization, reasonable challenge, or confident rejection.

Kount’s solution provides detailed data such as: trusted device status, IP addresses and geolocation, mobile and proxy indicators, and numerous velocities. This information ensures that the execution of user authentication policies is truly risk based. It creates a welcoming experience for known customers and protects against fraudsters.

Triangle
Trusted_Device

Trusted Device Status

Kount’s Trusted Device can reduce friction for returning users by treating the device as an invisible factor of authentication. When a user has reached a trusted state through authentication processes, their device is established as “trusted” for that user account.

The next time the user logs in from the same device, they are recognized, and the familiar, trusted device enables lower friction.

Anomaly_Detection

Anomaly Detection

Kount monitors velocities to detect high-risk, anomalous login activity. For example, the number of different usernames coming from a single device within the last minute or the number of different devices used with a single username within the last hour can be indicative of fraudulent activity.

Kount checks velocities in real-time to help determine whether a login should be allowed, declined, or challenged with secondary authentication.

Behavioral_Biometrics

Behavioral Biometrics

Kount’s solution can passively gather a user’s behavior during login and site navigation. User behaviors such as keystroke patterns and mouse movements, which are unique to an individual, are analyzed over multiple login attempts to establish a behavior baseline.

This behavior can be used to identify threat actors (even when they use stolen account credentials) before they have an opportunity to take over a legitimate customer’s account.

Data_Sharing

Data Sharing

Kount’s solution provides rich data about each login event. This includes information about the device, the trust status of that device, behavioral biometrics information and geolocation to enable the right level of friction at the time of login.

Path

The Combination Is Everything

The combined effect of all these elements makes Kount the leader in digital account takeover protection, new account fraud prevention, and payments fraud prevention. It provides enterprise-grade protection against financially malicious activity.

Payments Fraud Prevention

Learn how Kount prevents digital payment transaction fraud.

New Account Fraud Prevention

Learn how Kount prevents new account creation fraud.

Account Takeover Protection

Learn how Kount protects against account takeovers.