Protect Your Journey
The user journey is not only an experience, but also a threat surface area for your business.
An enterprise ecommerce company
An online marketplace
A consumer startup with online users
A neobank or fintech company
A brand with a digital presence
Marketing team
Security team
Trust & Safety team
Legal & Compliance team
Account Creation
Promo abuse, synthetic identity fraud, and buyer-seller collusion are some of the biggest forms of abuse at account creation. The risk is centered around people creating false identities or abusing campaigns for new users. A strategy to address this form of fraud is the most nuanced, based on industry regulations and user risk.
Do it yourself | Dodgeball | |
---|---|---|
Integrate a KYC provider | 3 days | 15 minutes |
Integrate an identity verification provider | 7 days | 15 minutes |
Integrate an identity intelligence provider | 3 days | 15 minutes |
Integrate a fraud engine or model to score risky behavior | 7 days | 15 minutes |
Stitch together the above providers into a single view of a user with a decisioning framework | 1-3 months | 0 minutes |
Create rule strategy for thresholds of risk | 3 days | 30 minutes |
Create and implement rules | 1 day | 5 minutes |
Add a centralized case management tool with queue and reporting | 3 days | 5 minutes |
Learning, integrating, and testing add’l cutting-edge tools | 21 days | 15 minutes |
Security team
Product team
Trust & Safety team
Login
Account Takeover is the biggest threat at this milestone. The risk revolves around your users being impersonated and their information or finances getting compromised.
Do it yourself | Dodgeball | |
---|---|---|
Integrate frictionless KYC | 3 days | 15 minutes |
Integrate a behavior and device intelligence provider | 3 days | 15 minutes |
Integrate a fraud engine that supports login scoring | 7 days | 15 minutes |
Stitch together the above providers into a single view of a user with a decisioning framework | 1-3 months | 0 minutes |
Deploy multi-factor authentication | 14 days | 15 minutes |
Integrate email intelligence | 3 days | 15 minutes |
Create rule strategy for thresholds of risk | 3 days | 30 minutes |
Create and implement rules | 1 day | 5 minutes |
Add a centralized case management tool with queue and reporting | 3 days | 5 minutes |
Learning, integrating, and testing add’l cutting-edge tools | 21 days | 15 minutes |
Payments team
Finance team
Trust & Safety team
Product & Engineering team
Customer Support team
Checkout
Payment fraud is the biggest threat at checkout. The risk revolves around fraudulent users using legitimate cardholder’s payment methods or legitimate users misusing their own cards by creating false chargebacks.
Do it yourself | Dodgeball | |
---|---|---|
Setup payment processor | 7 days | 7 days |
Integrate frictionless KYC | 3 days | 15 minutes |
Integrate a behavior and device intelligence provider | 3 days | 15 minutes |
Integrate a payments fraud engine to score risky behavior | 7 days | 15 minutes |
Stitch together the above providers into a single view of a user with a decisioning framework | 1-3 months | 0 minutes |
Deploy multi-factor authentication | 14 days | 15 minutes |
Implement CVV and AVS Requirements | 2 days | 15 minutes |
Create rule strategy for thresholds of risk | 3 days | 30 minutes |
Create and implement rules | 1 day | 5 minutes |
Add a centralized case management tool with queue and reporting | 3 days | 5 minutes |
Learning, integrating, and testing add'l cutting-edge tools | 21 days | 15 minutes |
Payments team
Finance team
Trust & Safety team
Product & Engineering team
Customer Support team
Chargeback
First-party fraud or chargebacks is the biggest threat to revenue post-checkout. The risk revolves around seemingly legitimate users creating false chargebacks. If you allow too many chargebacks, then payment providers will take a larger percentage in fees.
Do it yourself | Dodgeball | |
---|---|---|
Integrate Ethoca Alerts | 7 days | 15 minutes |
Integrate Verifi Alerts & RDR | 7 days | 15 minutes |
Integrate Chargeback Automation | 7 days | 15 minutes |
Centralize Alerts/Disputes with Transaction and User data | 14 days | 5 minutes |
Review Alerts and Chargeback Notifications | 30 minutes | 0 minutes |
Investigate and Determine Response | 15 minutes | 0 minutes |
Collect Transaction and User Specific Data | 5 minutes | 0 minutes |
Create Compelling Evidence including compiled data | 30 minutes | 0 minutes |
Create Chargeback Management Strategy | 3 days | 15 minutes |
Create and implement rules | 1 day | 5 minutes |
Add a centralized case management tool with queue and reporting | 3 days | 5 minutes |
Learning, integrating, and testing add'l cutting-edge tools | 21 days | 15 minutes |