The Kount Difference
Kount enables contextual, risk-based authentication. Kount’s device and account intelligence analyzes digital risk signals along with account behaviors to ascertain the appropriate response—frictionless authorization, reasonable challenge, or confident rejection.
Kount’s solution provides detailed data such as: trusted device status, IP addresses and geolocation, mobile and proxy indicators, and numerous velocities. This information ensures that the execution of user authentication policies is truly risk based. It creates a welcoming experience for known customers and protects against fraudsters.
Trusted Device Status
Kount’s Trusted Device can reduce friction for returning users by treating the device as an invisible factor of authentication. When a user has reached a trusted state through authentication processes, their device is established as “trusted” for that user account.
The next time the user logs in from the same device, they are recognized, and the familiar, trusted device enables lower friction.
Kount monitors velocities to detect high-risk, anomalous login activity. For example, the number of different usernames coming from a single device within the last minute or the number of different devices used with a single username within the last hour can be indicative of fraudulent activity.
Kount checks velocities in real-time to help determine whether a login should be allowed, declined, or challenged with secondary authentication.
Kount’s solution can passively gather a user’s behavior during login and site navigation. User behaviors such as keystroke patterns and mouse movements, which are unique to an individual, are analyzed over multiple login attempts to establish a behavior baseline.
This behavior can be used to identify threat actors (even when they use stolen account credentials) before they have an opportunity to take over a legitimate customer’s account.
Kount’s solution provides rich data about each login event. This includes information about the device, the trust status of that device, behavioral biometrics information and geolocation to enable the right level of friction at the time of login.