Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Fraud.net Features

What are the features of Fraud.net?

Intelligence

  • Transaction Scoring
  • Risk Assessment
  • Intelligence Reporting
  • ID Analytics

Detection

  • Fraud Detection
  • Alerts
  • Real-Time Monitoring
  • Real-Time Monitoring

Response

  • Device Tracking
  • Fraud Markers
  • Blacklisting
  • Bot Mitigation

Administration

  • Fraud Markers
  • Transaction Scoring
  • Blacklisting

Top Rated Fraud.net Alternatives

Filter for Features

Intelligence

Transaction Scoring

Based on 16 Fraud.net reviews and verified by the G2 Product R&D team. Rates each transaction's risk based on specific factors and their benchmarked scores.
85%
(Based on 16 reviews)

Risk Assessment

Based on 18 Fraud.net reviews and verified by the G2 Product R&D team. Flags suspicious transactions and either alerts administrators or declines transaction.
85%
(Based on 18 reviews)

Intelligence Reporting

Based on 16 Fraud.net reviews and verified by the G2 Product R&D team. Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
89%
(Based on 16 reviews)

ID Analytics

Based on 15 Fraud.net reviews and verified by the G2 Product R&D team. Stores data from external or internal sources related to fake accounts, evaluating users for risk.
86%
(Based on 15 reviews)

Detection

Fraud Detection

Based on 19 Fraud.net reviews and verified by the G2 Product R&D team. Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
87%
(Based on 19 reviews)

Alerts

Based on 17 Fraud.net reviews and verified by the G2 Product R&D team. Alerts administrators when fraud is suspected or transactions have been declined.
87%
(Based on 17 reviews)

Real-Time Monitoring

Based on 17 Fraud.net reviews and verified by the G2 Product R&D team. Constantly monitors system to detect anomalies in real time.
85%
(Based on 17 reviews)

Payment Verification

Requires verification of credit card, debit card, and money transfers prior to accepting payments

Not enough data

Bot Mitigation

Monitors for and rids systems of bots suspected of committing fraud.

Not enough data

Real-Time Monitoring

Based on 13 Fraud.net reviews. Constantly monitors system to detect anomalies in real time.
78%
(Based on 13 reviews)

Alerts

Based on 11 Fraud.net reviews. Alerts administrators when fraud is suspected or transactions have been declined.
76%
(Based on 11 reviews)

Response

Device Tracking

Based on 13 Fraud.net reviews and verified by the G2 Product R&D team. Keeps records of geographic location and IP addresses of fraud suspects.
90%
(Based on 13 reviews)

Fraud Markers

Based on 14 Fraud.net reviews and verified by the G2 Product R&D team. Tags users suspected of committing fraud and identifies them upon return.
85%
(Based on 14 reviews)

Blacklisting

Based on 14 Fraud.net reviews and verified by the G2 Product R&D team. Prevents previous committers of fraud from future transactions.
79%
(Based on 14 reviews)

Bot Mitigation

Based on 11 Fraud.net reviews and verified by the G2 Product R&D team. Monitors for and rids systems of bots suspected of committing fraud.
77%
(Based on 11 reviews)

Analysis

ID Analytics

Stores data from external or internal sources related to fake accounts, evaluating users for risk.

Not enough data

Intelligence Reporting

Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to payments and fraud.

Not enough data

Administration

Fraud Markers

As reported in 11 Fraud.net reviews. Tags users suspected of committing fraud and identifies them upon return.
74%
(Based on 11 reviews)

Transaction Scoring

Rates each transaction's risk based on specific factors and their benchmarked scores. 12 reviewers of Fraud.net have provided feedback on this feature.
81%
(Based on 12 reviews)

Blacklisting

Based on 13 Fraud.net reviews. Prevents previous committers of fraud from future transactions.
81%
(Based on 13 reviews)

Fraud Detection

Name Matching

The solution uses intelligent algorithms like fuzzy matching to identify potential risks.

Not enough data

Watch List

Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity).

Not enough data

Scoring

Score persons and organizations based on their history and risk potential.

Not enough data

E-filing

Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms.

Not enough data

Workflows and Alerts

Standard workflows to assign workload and to alert users based on predefined triggers.

Not enough data

Compliance

Due Dilligence

Manage due dilligence processes such as Customer Due Diligence and Know Your Customer.

Not enough data

Regulations and Jurisdictions

Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA.

Not enough data

Internal Policies

Compliance with fraud and risk management policies created by the company using the solution.

Not enough data

Monitoring

Models

Create behavior models that can be used to detect suspicious behavior.

Not enough data

Simuation

Simulate and validate scenarios to address multiple types of risks.

Not enough data

Transaction Monitoring

Real-time transaction screening to immediately identify potential risks.

Not enough data

Segmentation

Allows users to segment and manage lists of suspicious persons and organizations.

Not enough data

QA

Evaluate the quality and performance of the anti-money laundering activities.

Not enough data

Vendor Performance

Track vendor performance using supplier data such as a history of transactions and contracts.

Not enough data

Notifications

Send alerts and notifications when corrective actions are needed to address supplier risk.

Not enough data

Oversight

Perform ongoing due diligence activities to auto calculate overall risk for each vendor.

Not enough data

Reporting

Compliance Reports

Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT.

Not enough data

Suspicious Activity

Display suspicious activity by period, risk type, person or organization.

Not enough data

Real-Time Dashboards

Dashboards to provide real-time data on suspicious transactions, persons, or organizations.

Not enough data

KPIs

Track vendor risk KPIs such as the time it takes vendors to respond to security incidents.

Not enough data

Templates

Include reporting templates for activities such as audits and vendor evaluation.

Not enough data

Centralized Data

Consolidate data from multiple systems that manage supplier information.

Not enough data

360 View

Provide a 360 view of suppliers which can be shared with internal or external users.

Not enough data

Risk Assessment

Content

Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology).

Not enough data

Contracts

Ability to review supplier contracts and identify critical requirements or potential risks.

Not enough data

Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them.

Not enough data

Risk Control

Reviews

Review vendor contracts and profiles to ensure compliance with regulation and internal policies.

Not enough data

Policies

Manage and enforce internal policies related to vendor risk management and controls.

Not enough data

Workflows

Provide workflows to mitigate risk and escalate issues proactively.

Not enough data