How FraudGuard Works
At FraudGuard our expertise is collecting real-time internet attacks and non-attack data through an automated, programmatic process.
We have created a massive honeypot deployment process with multiple different cloud providers leveraging several industry standard technologies to pinpoint attackers based off of severity, location, and frequency to assist with collecting attack data. Non-attack data like public anonymizer services (like TOR or open public proxies) is collected and correlated to assist in validating source, etc.
By utilizing our constantly updating Threat Feed, FraudGuard can drastically reduce the chances of your network or organization being attacked by any number of threats.
The FraudGuard service was originally designed as a data only service. We provide an easy way to validate usage by continuously collecting and analyzing real-time internet traffic. Utilizing just a few API endpoints, we make integration as simple as possible for developers and engineers alike.
FraudGuard Use Cases
The most typical use case for the FraudGuard service is utilizing our risk levels to determine if traffic inbound to your network or infrastructure is considered safe.
Another popular use case is utilizing the country code to determine the source of traffic and blocking or changing application settings based on this information.
For example quite a few of our customers rely on FraudGuard APIs to change application components like session state, cookie duration, verbose logging components, remember my password options, even in some cases customer notification or verification of possible account attack.
We also have other customers testing our FraudGuard v2 APIs. In FraudGuard v2 we released bulk API management including, geographic blacklist, custom whitelist, custom blacklist, and top tracked IPs by both threat and risk. These bulk APIs allow easy integration into network components like on-premise firewalls, network access control lists, cloud security appliances, web application firewalls, etc.
The options for implementation are nearly limitless. Every individual has their own need for the data we provide and how you use that data is completely up to you.