Device Reputation
Device reputation offers seamless authentication with strong digital security and a frictionless user experience.
The intelligence to detect and prevent fraud
Financial regulations - KYC, AML, and PSD2/Open Banking - demand high-assurance identity verification. Your customers demand flexible, digital service on their schedule. Our ID proofing solution provides both by supporting 6,000 government-issued identification documents from 196+ countries, as well as presenter verification and liveness test options.
Here's how it works
There are no servers to manage or software to deploy. You simply use our cloud-based service to establish your policies and monitor activity on your networks.
Step One
A user visits your website or mobile app from any device.
Step Two
Device fingerprint and data attributes are collected via JavaScript or Mobile SDK.
Step Three
An Authentication or Fraud request is sent to our device intelligence platform for analysis.
Step Four
A customized real-time response is returned regarding the device and the transaction within milliseconds.
Step Five
Based on you predetermined policies, our solution either approves or denies access — or issues a step-up challenge for additional proof of identity.
Benefits of Device Reputation
Proactive security
Detect compromised devices before they are granted access.
Reduced risk
Prevent theft of valid credentials, reducing fraud risk.
Frictionless User Experience
Keep friction to a minimum with a security layer that is seamless to users.
Device Reputation Features
Device ID and Registration
Affirm user identity by matching device fingerprints with a high degree of accuracy.
Device Change Tolerance
Minimizes false negative responses and establishes acceptable risk with built-in intelligence on typical device changes.
Reveal Hidden Connections
Initiate step-up authentication challenges when bad device activity patterns or actors are recognized.
Evasion Detection
Proxy piercing detects fraudulent servers using advanced techniques to unmask anonymizing activity.
Global Device Intelligence Platform
Real-time device feedback from thousands of risk analysts flag suspicious accounts and devices.
"PII-less" Precision
Recognition technology instantly identifies without a user's personally identifiable information.
Identity Portfolio
Our Identity Portfolio Capabilities
Authenticate
Streamline the onboarding of diverse users and devices with a wide range of technologies.
Authorize
Ensure both strong security and exceptional user experiences with these best-in-class technologies.
Transact and Manage
Continuously protect against advanced threats with technology from behavior analytics to fraud detection.
Entrust Identity Use Cases
Consumer
Consumer Banking
Attract and retain customers with best-in-class mobile and online banking services.
Customer Portals
Give customers frictionless access to your portals — and build a great brand experience.
CIAM Integration
Our portfolio integrates seamlessly with your customer identity and access management (CIAM) strategies.
Meet PSD2 Regulations
We have the trusted identity tools you need to help you be successful and in compliance.
Workforce
Physical/Logical Access
Our portfolio offers the necessary technologies to integrate physical and logical secure access.
Privileged Worker
Protect the critical application credentials of system administrators or senior leaders.
Passwordless Login
Get a passwordless SSO solution that supports all devices, PCs and Macs, and cloud and on-premises apps.
Enable PIV Compliant Government Mobility
Remove complexity and enable highly secure mobility with proven PIV solutions.
Citizen
Digital Citizen
Use our portfolio to secure and manage passports, national IDs, and driver's licenses.