Minimise risk while maximising conversion
Intelligent fraud detection algorythms are essential for today’s financial transaction environment. By adding modular risk intelligence you are able to immediately detect and defend yourself against attacks without impacting your clients.
ZaaPay delivers tailored fraud protection solutions for all online payment methods and industries, and our technology has helped our clients increase revenues by up to 30%.
After 10 years experience in fraud prevention, we bundled the most proven risk checks into three packages. Simply select the one that suits you best - with only one click. Activate your safeguard against online fraud now!
- Global blacklist by accounts
- Plausibility check by BIN country (= IP country )
- Identifies Doublet within Timeframe
- All of the Basic package checks
- Anonymous proxy check
- Account velocity check
- All of the Advanced package checks
- Fraud Attempt Cache
- Fraud Pattern
- 24h Blacklist Check
- 3D Secure for card processing
Our automated risk checks:
There are four event scoring types to help you secure your account. Automated blacklists and whitelists help solve all main issues with existing customers by checking information stored on the lists, and the 24-hour blacklist is a powerful solution that aggressively blocks accounts with any one of a number of different qualifiers. Whether you list shoppers by account, IP address, email address, payment method or any other specific categorisation, new entries are added during processing and applied across all of your merchants.
Geo IP location:
Geo IP location occurs in real time with the assistance of ZaaPay’s vast database to verify the IP address of the shopper’s device. IP-based checks and geolocation checks can be used to determine the IP routing type, such as country, city or anonymous proxy. And with ZaaPay’s solution you can combine the BIN range, BIN country and billing address to benefit from a highly effective data minding checks, which allows you to monitor geographic data, local regulations and blocking countries.
Velocity checks are carried out on accounts, merchants, IP and email addresses, tx per account, tx per entity, tx per IP, tx per email, tx amount and registration amount. There are four main variables: IP address, client account (e.g. credit card number), email address and merchant entity. The latter is a very important tool for merchant monitoring and is a part of our risk-portfolio. Velocity checks control transaction traffic on your platform.
ZaaPay's device tracking tool can easily be activated into the payment page per configuration. The device code is wrapped with the COPYandPAY widget library which means the merchant only needs to work with one API. A token of the device is generated while the transaction is in process, and you can decide whether you want to generate an event list for the specific device.
This semantic validation logically relates data or information to certain conditions you define as being true or valid. The validation checks can be carried out on names, email addresses, IP, phone numbers, accounts (e.g. credit card, debit card), bank accounts (account number and bank code algorithm checks, BIN and bank code database checks, verification code checks such as CVV, digit checks, etc.) and many more.
Know Your Customer (KYC):
Know your customer and know your shopper. Verification includes 3D secure, where the cardholder chooses a password and provides other authentication requirements such as CVV/CVC, DP address check, Schufa and AVS – all of which are seamlessly integrated into the merchant’s checkout process with ZaaPay’s technology. And with SMS and email identification you can make identify your customers.
The risk management modules perform all necessary validations on a transaction and are controlled by an intelligent rule engine that steers the scoring process. With ZaaPay you can combine risk checks to control shopper profiles, and by activating all relevant risk checks the flexible scoring is executed, which automatically evaluates the transaction risk, double checking with previously set up blacklists and whitelists.