Device Intelligence Icon

Device Intelligence

97% of all fraud comes from an anomalous device or network. The Device Intelligence layer recognizes just that; finds trusted devices among your traffic to help weed out most of your threats.


How does it work?

This layer gathers hundreds of data points from the device, network, connection, and location. This includes information such as the type of device, the settings, or the IP address. The assessment helps recognize devices previously seen in the vast NuData network, which monitors billions of events every month! With this information, the device intelligence layer creates an accurate device identifier that combines the device ID, device fingerprint, and account history.


Also helps with:

  • Credential stuffing
  • Credential harvesting
  • Credential testing
  • Account takeover
  • Credit card testing

Why do attackers disguise their devices?

As bad actors deploy mass-scale attacks, they run out of new devices to use and spoof previously-used devices to resemble new ones. This is like robbing a store and returning the next day nonchalantly, wearing a wig and sunglasses, to steal again. When the device intelligence layer recognizes that any of the device parameters are linked to past fraud, it mitigates it in real time.