Spot account takeovers with transparent authentication and detect evasion attempts that use emulators or TOR networks with proxy piercing.
Secure, effortless access
Speed up logins for known customers by removing extra friction, such as entering usernames and passwords.
Seamlessly integrated workflows
Easily integrate with existing workflows to recognise consumer devices, creating a hassle-free second layer of authentication.
Here’s what you can do with Device-Based Authentication.
Pair known devices with accounts for fast, smooth logins. This transparent authentication solution simultaneously checks against a full spectrum of risk indicators in real-time while offering friction-right customer experiences.
Immediately identify whether a device is authorised to access an account and if there are any risk signals.
Enhance account security
Help to protect customer accounts with two-factor authentication, even if login credentials have been compromised.
Leverage risk-aware authentication
Gain context and risk insight, such as geolocation or true IP address mismatches, to better manage account access requests and step-up authentication processes.
Employ invisible authentication
Recognise and use consumers’ devices as a form of primary or secondary verification — adding additional security, not needless friction.
If you’re a consumer with questions or issues related to your personal credit report, drivers history report, disputes, fraud, identity theft, credit report freeze or credit monitoring services, please visit our Customer Enquiries page for assistance.
Contact Us
We're sorry, your request failed. Please try again in a little while.