Device Intelligence Icon

Device Intelligence

97% of all fraud comes from an anomalous device or network. The device intelligence layer weeds out those threats by flagging high-risk devices in real time.


How does it work?

This layer gathers hundreds of data points from the device, network, connection, and location. The real-time assessment helps recognize devices seen in the vast NuData network, which monitors billions of events every month! This information is key to create an accurate device identifier that combines the device ID, device fingerprint, and account history. And flag that fraudulent device before it gets in.


Also helps with:

  • Credential stuffing
  • Credential harvesting
  • Credential testing
  • Account takeover
  • Credit card testing

Why do attackers disguise their devices?

As bad actors deploy mass-scale attacks, they run out of new devices to use. Then, they spoof their devices to look like new ones. This is like robbing a store and returning the next day to steal again, but wearing sunglasses and a wig. When the device intelligence layer recognizes any of the parameters as linked to past fraud, it mitigates it in real time.