Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

Sardine Features

What are the features of Sardine?

Detection

  • Payment Verification
  • Bot Mitigation
  • Real-Time Monitoring
  • Alerts

Analysis

  • ID Analytics
  • Intelligence Reporting
  • Incident Reports

Administration

  • Fraud Markers
  • Transaction Scoring
  • Blacklisting

Filter for Features

Intelligence

Transaction Scoring

Rates each transaction's risk based on specific factors and their benchmarked scores.

Not enough data

Risk Assessment

Flags suspicious transactions and either alerts administrators or declines transaction.

Not enough data

Intelligence Reporting

Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.

Not enough data

ID Analytics

Stores data from external or internal sources related to fake accounts, evaluating users for risk.

Not enough data

Detection

Fraud Detection

Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.

Not enough data

Alerts

Alerts administrators when fraud is suspected or transactions have been declined.

Not enough data

Real-Time Monitoring

Constantly monitors system to detect anomalies in real time.

Not enough data

Payment Verification

As reported in 17 Sardine reviews. Requires verification of credit card, debit card, and money transfers prior to accepting payments
86%
(Based on 17 reviews)

Bot Mitigation

As reported in 17 Sardine reviews. Monitors for and rids systems of bots suspected of committing fraud.
87%
(Based on 17 reviews)

Real-Time Monitoring

Constantly monitors system to detect anomalies in real time. This feature was mentioned in 18 Sardine reviews.
92%
(Based on 18 reviews)

Alerts

Based on 16 Sardine reviews. Alerts administrators when fraud is suspected or transactions have been declined.
90%
(Based on 16 reviews)

Response

Device Tracking

Keeps records of geographic location and IP addresses of fraud suspects.

Not enough data

Fraud Markers

Tags users suspected of committing fraud and identifies them upon return.

Not enough data

Blacklisting

Prevents previous committers of fraud from future transactions.

Not enough data

Bot Mitigation

Monitors for and rids systems of bots suspected of committing fraud.

Not enough data

Analysis

ID Analytics

As reported in 17 Sardine reviews. Stores data from external or internal sources related to fake accounts, evaluating users for risk.
88%
(Based on 17 reviews)

Intelligence Reporting

Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. 18 reviewers of Sardine have provided feedback on this feature.
89%
(Based on 18 reviews)

Incident Reports

Produces reports detailing trends and vulnerabilities related to payments and fraud. 16 reviewers of Sardine have provided feedback on this feature.
83%
(Based on 16 reviews)

Administration

Fraud Markers

Based on 18 Sardine reviews. Tags users suspected of committing fraud and identifies them upon return.
95%
(Based on 18 reviews)

Transaction Scoring

Based on 18 Sardine reviews. Rates each transaction's risk based on specific factors and their benchmarked scores.
88%
(Based on 18 reviews)

Blacklisting

Based on 19 Sardine reviews. Prevents previous committers of fraud from future transactions.
95%
(Based on 19 reviews)

Encryption

Encrypts all data transfers using end-to-end encryption.

Not enough data

Audit Trails

Provides audit trails to monitor useage to reduce fraud.

Not enough data

Regulatory Compliance

Complies with regulations for strong customer authentication such as KYC, PSD2, and others.

Not enough data

Bi-Directional Identity Synchronization

Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.

Not enough data

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.

Not enough data

Cloud Directory

Provides or integrates with a cloud based directory option that contains all user names and attributes.

Not enough data

Application Integrations

Integrates with common applications such as service desk tools.

Not enough data

Integration

Uses Open Standards

Connections use open standards such as SAML or RADIS.

Not enough data

Mobile SDK

Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.

Not enough data

Workforce Authentication

Integrates with identity and access management (IAM) solutions to manage workforce authentication.

Not enough data

Customer Authentication

Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.

Not enough data

Fraud Detection

Name Matching

The solution uses intelligent algorithms like fuzzy matching to identify potential risks.

Not enough data

Watch List

Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity).

Not enough data

Scoring

Score persons and organizations based on their history and risk potential.

Not enough data

E-filing

Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms.

Not enough data

Workflows and Alerts

Standard workflows to assign workload and to alert users based on predefined triggers.

Not enough data

Compliance

Due Dilligence

Manage due dilligence processes such as Customer Due Diligence and Know Your Customer.

Not enough data

Regulations and Jurisdictions

Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA.

Not enough data

Internal Policies

Compliance with fraud and risk management policies created by the company using the solution.

Not enough data

Monitoring

Models

Create behavior models that can be used to detect suspicious behavior.

Not enough data

Simuation

Simulate and validate scenarios to address multiple types of risks.

Not enough data

Transaction Monitoring

Real-time transaction screening to immediately identify potential risks.

Not enough data

Segmentation

Allows users to segment and manage lists of suspicious persons and organizations.

Not enough data

QA

Evaluate the quality and performance of the anti-money laundering activities.

Not enough data

Reporting

Compliance Reports

Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT.

Not enough data

Suspicious Activity

Display suspicious activity by period, risk type, person or organization.

Not enough data

Real-Time Dashboards

Dashboards to provide real-time data on suspicious transactions, persons, or organizations.

Not enough data