Pre-Transaction Fraud Detection, Traffic Shaping and Scrub

Is your customer hiding behind a PROXY? Have they jumped onto a High Risk, anonymous network to make the purchase? Are they in a High Risk country? We can determine all these things and more. With CERTIFY, you are in control of your traffic. Set up filters to ACCEPT, DECLINE, or mark for REVIEW based on these attributes and more.

CERTIFY quantifies much more than what is mentioned above. Included are filters for High Risk; email addresses, local time of day, phone numbers, addresses and Card Attributes.

Through our relationship with MaxMind, a MinFraud score is included in your CERTIFY request. Every attribute of acquired profile data can be individually set, by return, to mark as requiring REVIEW or as a DECLINE. If you aren't sure how to mark an attribute, you can use the Cyber Secure Networks recommendations or use the AI generated global settings of; OFF, LOW, MEDIUM, HIGH to set scrub levels.

Enterprise level? Get a Quote!

layout styles

Advantages for you

CERTIFY brings you an initial, pre-transaction tool to cleanse your traffic of High Risk submissions.

Submit a few pieces of information and CERTIFY will derive 100+ check points to run against configured risk thresholds. Cyber Secure Networks fosters unique relationships that allow us to give you an in depth risk profile of your transaction submissions. Customize your account to find the best balance and scrub level to maximize your fraud detection and prevention without sacrificing good traffic. Use our AI generated rules or your own to refine your integration and maximize your success.


How it works

There are many steps that go into the Cyber Secure Network's CERTIFY system. Some of these are proprietary, however, you can find a general outline below.

  1. IP Address, Email Address, Phone Number, User-Agent, and Card Number ( or a subset of these ) are submitted to the CERTIFY API
  2. Information and values are consolidated, formatted, validated and authenticated
  3. Received information is categorized and initial checks are run against it ( Valid IP Address, Valid Email Address, User-Agent derived profile, Card Number validity, etc. ) to create a wholistic, valid, CERTIFY object.
  4. Additional attributes are gathered from the CERTIFY group of attributes including; physical location, network categorization, local time, issuing bank data, among others...
  5. After all preliminary attributes are gathered, they are run against values and pre-set configurations put in place by the account administrator, whether they are custom or set as system defaults
  6. If previous steps are passed, and the request contains the enabled flagged, collected attributes are rolled up and sent for a MinFraud Risk Score.
  7. Request response data is collected and returned to the customer, or, applied to pre-configured filter thresholds to establish a return of; APPROVED, REVIEW, DECLINE

style switcher