Fraud

Stay ahead of ever-evolving fraud

Get the building blocks you need to pinpoint, fight, adapt to, and monitor fraud at every point of the identity lifecycle.

80%
time savings with automated verifications
98%
automated verifications and unites KYB and KYC
<1 day
manual review case resolution with a custom investigations hub
93%
automated verifications while proactively fighting fraud

Verification flows that adapt to real-time fraud signals

Let more good users in while deterring potential fraudsters by dynamically adjusting friction based on user risk signals. Customize everything from what forms of IDs you’ll accept to the branding of your verification flow.

Dynamic friction

Adjust friction in real time based on users’ risk profiles to deter bad actors and convert good users faster.

Custom verification methods

Pick and choose from a robust library of verification methods to ensure a user’s identity is authentic.

Automated Verifications

Verify users in seconds and keep PII safe by eliminating the need for third-party manual reviews.

3 Point Biometrics

Protect against identity spoofing by comparing a selfie to an ID portrait with a 3 point composite and biometric liveness checks.

Document verification

Collect and verify documents (like government IDs, business documents, and more) to identify the people and businesses you work with.

Data Privacy

Securely store PII according to your requirements with Persona. Control redaction policies, who has access, and how you use data to support users across their identity lifecycle.

Identify more fraudsters with holistic risk signals

Make better decisions by consolidating all your risk signals — active, passive, or enriched from third-party data sources — into one place. Remove uncertainty by determining the exact criteria that you deem risky and decide when you want to block or reverify individuals.

Watchlists screenings

Automatically screen users against lists of your choosing, such as global sanction, warning, and PEP lists.

Behavioral & Collected signals

Leverage signals collected during the user’s verification flow to detect any suspicious behavior.

Third-party sources

Enrich user profiles with data from third-party sources with no-code integrations.

Duplicate Account Protection

Flag repeat users and prevent bad actors from using duplicate or doctored IDs to regain entry.

Account takeover protection

Automatically reverify users when you detect risky behavior, like unknown IP addresses or new devices.

Case Management

Send edge cases for manual review and create a custom investigations hub for your team.

Proactively protect your business against fraud

Discover hard-to-catch fraud with link analysis and uncover customer networks with similar characteristics — without any painful engineering work. Strengthen your fraud strategy by updating queries with your insights to automate workflows, block bad actors, and more.

LINK ANALYSIS

Visualize entire customer networks and enable your team to discover and investigate potential fraud rings.

blocklists

Block, allow, or flag individuals based on known or collected information.

workflows

Act on fraud insights by creating automated rules to flag risky actors based on custom criteria, block known bad actors, and more.

High stakes, high level of control

Continually optimize your fraud strategy with insights from link analyses and analytics. Empower your manual review teams with customizable case management views and custom macros that help them close the loop on investigations.

Custom MODULES

Build your ideal review process by mixing and matching from a robust library of case modules, such as modules to display Persona and third-party data, checklists, communication modules, and more. 

Third-party integrations

Build custom follow-up actions that your team can access from their case view so that they don’t need to switch between programs.

Link analysis view

Give analysts a more holistic picture by allowing them to visualize the networks that customers operate in during AML investigations.

Fraud rule sets

Create no-code rule sets around fraud patterns to automatically keep bad actors out.

Automatic enrichment and follow-ups

Automatically pull in data from third-party sources like SentiLink and initiate follow-up actions in third-party systems like Salesforce.

Modular permissions and access controls

Create custom permission sets for your teams and control who can access sensitive PII data and exactly what they can access.

Enrich user risk profiles with on-demand reports

Watchlists

Screen across global sanction, warning, and PEP lists automatically. Customize the lists to screen through and match configurations to reduce false positives.

Adverse media

Supercharge your Enhanced Due Diligence (EDD) process by automating customized adverse media checks across 400+ million news articles.

Social media report

Surface your customers’ social media in a fully-compliant manner to meet your KYC and marketing needs.

Email and phone risk

Assess the fraud risk and reputation of an email address or phone number from suspicious or fake actors.

Address lookup

Validate address deliverability and address type (commercial vs. residential, PO Box), as well as surface street views.

Verify users the way you want

Pick and choose from signals powered by thousands of authoritative data sources, including global watchlists, adverse media, and email/phone risk reports.

Government ID

Extract and verify government IDs, such as passports and driver’s licenses, with configurable and automated heuristic checks across 200+ countries and territories.

Biometric verifications

Protect against identity spoofing by automatically comparing a selfie to the ID portrait with a 3 point composite and biometric liveness checks. Let good users in quickly while keeping fraudsters out with custom liveness thresholds.

SSN Verification (eCBSV)

Compare names, SSNs, and addresses against Social Security Administration records to verify more users (e.g. those with thin credit).

DMV verification (AAMVA)

Validate information on US driver’s licenses and IDs against DMV records to detect fraudulent IDs.

Phone Carrier Verification

Verify the authenticity of inputted phone numbers by checking the legal name and phone number against global telecommunications carrier databases.

Phone verification (2FA)

Verify the ownership of an inputted phone number with two-factor authentication via call or text.

Device signals

Detect potential fraud by monitoring passive signals such as IP address, device fingerprint, and more.

mDL verification

Verify mobile driver’s licenses (mDLs) from industry leading digital wallet providers to reduce friction for users. Now available for iOS devices.

Wherever your users are, we’re there too

Scale where you want to, the way you want to. Persona provides coverage all over the globe and across many languages, and we’re always looking for more opportunities to expand your coverage.

200+
countries and territories
20+
localized languages
200+
countries and territories

Security and privacy at our core

Security and privacy are paramount to a trusted relationship. That’s why Persona is certified to the highest industry standards and committed to protecting you and your customers' privacy.
Persona enables us to look at all signals from a customer and catch red flags in a way that the human eye can’t. Rather than manually comparing past applications or scrutinizing ID photos, Persona’s AI helps us automatically identify these bad actors, saving us a lot of hassle.”
Yaseen Refai-Ahmed
Fraud intelligence manager at Newton
Newton

Newton reduces its fraud investigation time to one day with Persona’s case management tool

Ready to get started?

Get in touch or start exploring Persona today.