Sardine Features
What are the features of Sardine?
Detection
- Payment Verification
- Bot Mitigation
- Real-Time Monitoring
- Alerts
Analysis
- ID Analytics
- Intelligence Reporting
- Incident Reports
Administration
- Fraud Markers
- Transaction Scoring
- Blacklisting
Top Rated Sardine Alternatives
Sardine Categories on G2
Filter for Features
Intelligence
Transaction Scoring | Rates each transaction's risk based on specific factors and their benchmarked scores. | Not enough data | |
Risk Assessment | Flags suspicious transactions and either alerts administrators or declines transaction. | Not enough data | |
Intelligence Reporting | Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. | Not enough data | |
ID Analytics | Stores data from external or internal sources related to fake accounts, evaluating users for risk. | Not enough data |
Detection
Fraud Detection | Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers. | Not enough data | |
Alerts | Alerts administrators when fraud is suspected or transactions have been declined. | Not enough data | |
Real-Time Monitoring | Constantly monitors system to detect anomalies in real time. | Not enough data | |
Payment Verification | As reported in 17 Sardine reviews. Requires verification of credit card, debit card, and money transfers prior to accepting payments | 86% (Based on 17 reviews) | |
Bot Mitigation | As reported in 17 Sardine reviews. Monitors for and rids systems of bots suspected of committing fraud. | 87% (Based on 17 reviews) | |
Real-Time Monitoring | Constantly monitors system to detect anomalies in real time. This feature was mentioned in 18 Sardine reviews. | 92% (Based on 18 reviews) | |
Alerts | Based on 16 Sardine reviews. Alerts administrators when fraud is suspected or transactions have been declined. | 90% (Based on 16 reviews) |
Response
Device Tracking | Keeps records of geographic location and IP addresses of fraud suspects. | Not enough data | |
Fraud Markers | Tags users suspected of committing fraud and identifies them upon return. | Not enough data | |
Blacklisting | Prevents previous committers of fraud from future transactions. | Not enough data | |
Bot Mitigation | Monitors for and rids systems of bots suspected of committing fraud. | Not enough data |
Analysis
ID Analytics | As reported in 17 Sardine reviews. Stores data from external or internal sources related to fake accounts, evaluating users for risk. | 88% (Based on 17 reviews) | |
Intelligence Reporting | Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. 18 reviewers of Sardine have provided feedback on this feature. | 89% (Based on 18 reviews) | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to payments and fraud. 16 reviewers of Sardine have provided feedback on this feature. | 83% (Based on 16 reviews) |
Administration
Fraud Markers | Based on 18 Sardine reviews. Tags users suspected of committing fraud and identifies them upon return. | 95% (Based on 18 reviews) | |
Transaction Scoring | Based on 18 Sardine reviews. Rates each transaction's risk based on specific factors and their benchmarked scores. | 88% (Based on 18 reviews) | |
Blacklisting | Based on 19 Sardine reviews. Prevents previous committers of fraud from future transactions. | 95% (Based on 19 reviews) | |
Encryption | Encrypts all data transfers using end-to-end encryption. | Not enough data | |
Audit Trails | Provides audit trails to monitor useage to reduce fraud. | Not enough data | |
Regulatory Compliance | Complies with regulations for strong customer authentication such as KYC, PSD2, and others. | Not enough data | |
Bi-Directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application. | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes. | Not enough data | |
Cloud Directory | Provides or integrates with a cloud based directory option that contains all user names and attributes. | Not enough data | |
Application Integrations | Integrates with common applications such as service desk tools. | Not enough data |
Integration
Uses Open Standards | Connections use open standards such as SAML or RADIS. | Not enough data | |
Mobile SDK | Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications. | Not enough data | |
Workforce Authentication | Integrates with identity and access management (IAM) solutions to manage workforce authentication. | Not enough data | |
Customer Authentication | Integrates with customer identity and access management (ICAM) solutions to manage customer authentication. | Not enough data |
Fraud Detection
Name Matching | The solution uses intelligent algorithms like fuzzy matching to identify potential risks. | Not enough data | |
Watch List | Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity). | Not enough data | |
Scoring | Score persons and organizations based on their history and risk potential. | Not enough data | |
E-filing | Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms. | Not enough data | |
Workflows and Alerts | Standard workflows to assign workload and to alert users based on predefined triggers. | Not enough data |
Compliance
Due Dilligence | Manage due dilligence processes such as Customer Due Diligence and Know Your Customer. | Not enough data | |
Regulations and Jurisdictions | Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA. | Not enough data | |
Internal Policies | Compliance with fraud and risk management policies created by the company using the solution. | Not enough data |
Monitoring
Models | Create behavior models that can be used to detect suspicious behavior. | Not enough data | |
Simuation | Simulate and validate scenarios to address multiple types of risks. | Not enough data | |
Transaction Monitoring | Real-time transaction screening to immediately identify potential risks. | Not enough data | |
Segmentation | Allows users to segment and manage lists of suspicious persons and organizations. | Not enough data | |
QA | Evaluate the quality and performance of the anti-money laundering activities. | Not enough data |
Reporting
Compliance Reports | Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT. | Not enough data | |
Suspicious Activity | Display suspicious activity by period, risk type, person or organization. | Not enough data | |
Real-Time Dashboards | Dashboards to provide real-time data on suspicious transactions, persons, or organizations. | Not enough data |