Fraud.net Features
What are the features of Fraud.net?
Intelligence
- Transaction Scoring
- Risk Assessment
- Intelligence Reporting
- ID Analytics
Detection
- Fraud Detection
- Alerts
- Real-Time Monitoring
- Real-Time Monitoring
Response
- Device Tracking
- Fraud Markers
- Blacklisting
- Bot Mitigation
Administration
- Fraud Markers
- Transaction Scoring
- Blacklisting
Top Rated Fraud.net Alternatives
(27)
4.3 out of 5
Visit Website
Sponsored
Fraud.net Categories on G2
Filter for Features
Intelligence
Transaction Scoring | Based on 16 Fraud.net reviews and verified by the G2 Product R&D team. Rates each transaction's risk based on specific factors and their benchmarked scores. | 85% (Based on 16 reviews) | |
Risk Assessment | Based on 18 Fraud.net reviews and verified by the G2 Product R&D team. Flags suspicious transactions and either alerts administrators or declines transaction. | 85% (Based on 18 reviews) | |
Intelligence Reporting | Based on 16 Fraud.net reviews and verified by the G2 Product R&D team. Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. | 89% (Based on 16 reviews) | |
ID Analytics | Based on 15 Fraud.net reviews and verified by the G2 Product R&D team. Stores data from external or internal sources related to fake accounts, evaluating users for risk. | 86% (Based on 15 reviews) |
Detection
Fraud Detection | Based on 19 Fraud.net reviews and verified by the G2 Product R&D team. Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers. | 87% (Based on 19 reviews) | |
Alerts | Based on 17 Fraud.net reviews and verified by the G2 Product R&D team. Alerts administrators when fraud is suspected or transactions have been declined. | 87% (Based on 17 reviews) | |
Real-Time Monitoring | Based on 17 Fraud.net reviews and verified by the G2 Product R&D team. Constantly monitors system to detect anomalies in real time. | 85% (Based on 17 reviews) | |
Payment Verification | Requires verification of credit card, debit card, and money transfers prior to accepting payments | Not enough data | |
Bot Mitigation | Monitors for and rids systems of bots suspected of committing fraud. | Not enough data | |
Real-Time Monitoring | Based on 13 Fraud.net reviews. Constantly monitors system to detect anomalies in real time. | 78% (Based on 13 reviews) | |
Alerts | Based on 11 Fraud.net reviews. Alerts administrators when fraud is suspected or transactions have been declined. | 76% (Based on 11 reviews) |
Response
Device Tracking | Based on 13 Fraud.net reviews and verified by the G2 Product R&D team. Keeps records of geographic location and IP addresses of fraud suspects. | 90% (Based on 13 reviews) | |
Fraud Markers | Based on 14 Fraud.net reviews and verified by the G2 Product R&D team. Tags users suspected of committing fraud and identifies them upon return. | 85% (Based on 14 reviews) | |
Blacklisting | Based on 14 Fraud.net reviews and verified by the G2 Product R&D team. Prevents previous committers of fraud from future transactions. | 79% (Based on 14 reviews) | |
Bot Mitigation | Based on 11 Fraud.net reviews and verified by the G2 Product R&D team. Monitors for and rids systems of bots suspected of committing fraud. | 77% (Based on 11 reviews) |
Analysis
ID Analytics | Stores data from external or internal sources related to fake accounts, evaluating users for risk. | Not enough data | |
Intelligence Reporting | Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to payments and fraud. | Not enough data |
Administration
Fraud Markers | As reported in 11 Fraud.net reviews. Tags users suspected of committing fraud and identifies them upon return. | 74% (Based on 11 reviews) | |
Transaction Scoring | Rates each transaction's risk based on specific factors and their benchmarked scores. 12 reviewers of Fraud.net have provided feedback on this feature. | 81% (Based on 12 reviews) | |
Blacklisting | Based on 13 Fraud.net reviews. Prevents previous committers of fraud from future transactions. | 81% (Based on 13 reviews) |
Fraud Detection
Name Matching | The solution uses intelligent algorithms like fuzzy matching to identify potential risks. | Not enough data | |
Watch List | Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity). | Not enough data | |
Scoring | Score persons and organizations based on their history and risk potential. | Not enough data | |
E-filing | Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms. | Not enough data | |
Workflows and Alerts | Standard workflows to assign workload and to alert users based on predefined triggers. | Not enough data |
Compliance
Due Dilligence | Manage due dilligence processes such as Customer Due Diligence and Know Your Customer. | Not enough data | |
Regulations and Jurisdictions | Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA. | Not enough data | |
Internal Policies | Compliance with fraud and risk management policies created by the company using the solution. | Not enough data |
Monitoring
Models | Create behavior models that can be used to detect suspicious behavior. | Not enough data | |
Simuation | Simulate and validate scenarios to address multiple types of risks. | Not enough data | |
Transaction Monitoring | Real-time transaction screening to immediately identify potential risks. | Not enough data | |
Segmentation | Allows users to segment and manage lists of suspicious persons and organizations. | Not enough data | |
QA | Evaluate the quality and performance of the anti-money laundering activities. | Not enough data | |
Vendor Performance | Track vendor performance using supplier data such as a history of transactions and contracts. | Not enough data | |
Notifications | Send alerts and notifications when corrective actions are needed to address supplier risk. | Not enough data | |
Oversight | Perform ongoing due diligence activities to auto calculate overall risk for each vendor. | Not enough data |
Reporting
Compliance Reports | Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT. | Not enough data | |
Suspicious Activity | Display suspicious activity by period, risk type, person or organization. | Not enough data | |
Real-Time Dashboards | Dashboards to provide real-time data on suspicious transactions, persons, or organizations. | Not enough data | |
KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. | Not enough data | |
Templates | Include reporting templates for activities such as audits and vendor evaluation. | Not enough data | |
Centralized Data | Consolidate data from multiple systems that manage supplier information. | Not enough data | |
360 View | Provide a 360 view of suppliers which can be shared with internal or external users. | Not enough data |
Risk Assessment
Content | Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). | Not enough data | |
Contracts | Ability to review supplier contracts and identify critical requirements or potential risks. | Not enough data | |
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. | Not enough data |
Risk Control
Reviews | Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | Not enough data | |
Policies | Manage and enforce internal policies related to vendor risk management and controls. | Not enough data | |
Workflows | Provide workflows to mitigate risk and escalate issues proactively. | Not enough data |