graph
network

transactions


Verifying Global Identities at Scale


The digital world makes it easier to connect with your customers globally online, but there's also a dark side to those interactions - fraudsters who impersonate your customers or create fake identities to exploit your business. Whether you're dealing with a customer signing up for an account on your website, or submitting an application for a loan, it can be hard to know who to trust.

Explore More
The Ekata Identity Engine helps you assess the risk of your customers using information powered by our combined technologies - two, unique datasets and sophisticated data science to help you vastly improve confidence in your fraud risk analysis.

Identity
Graph

Validates identity elements and how they are linked

Identity
Network

Analyzes how identity elements are being used online
In the Ekata Identity Graph, we aggregate more than a billion identities using high-quality, licensed data from global data providers that have been carefully vetted for accuracy and compliance.
The Identity Graph confirms these digital identity elements are valid and that they are correctly linked to one another.
For instance, your customer's name might be linked to three different emails, two phone numbers, two addresses, and two IPs.
And one of those emails could be tied to two different names.
And one of their phone numbers could be associated with three different names.
Hover over the Identity Graph to explore how identity elements are connected to one another.
Validating identity elements and their linkages is critical in fraud risk assessment, but often can only tell half the story.
With so much data flying around, fraudsters can easily steal identity information and appear as a legitimate customer. Understanding how those identity elements are being used online provides a much clearer picture as to whether your customer actually is who they say they are.
The Ekata Identity Network, made up of over 200M monthly anonymized real-world queries, surfaces transaction-level intelligence.
The data is used to observe patterns of how hashed identity elements within those transactions are actually being used in the digital world.
One of those patterns is velocity - how often an identity element or (combinations of elements) is used.
For instance, an email used 221 times in the last 180 days.
Hover Chart to Show More
Another pattern is popularity - how many businesses the information has been used at.
For instance, the same IP used at 25 businesses in the last 30 days.
Hover Chart to Show More
And lastly, volatility - how often identity elements are used with one another.
For instance, one phone number used with 12 different emails in the last 90 days.
Hover Chart to Show More
Hover over the identity elements to understand how they have been used across transactions within the Identity Network.
Combined with powerful data science, the Ekata Identity Engine leverages these two datasets, Identity Network and Identity Graph, to produce predictive data signals so you can better understand who your customer is and how their information is being used online.
Contact us to learn how our identity verification data can help you make accurate risk decisions about your customers and mitigate fraud at scale, across the globe and faster than the blink of an eye.
Learn more
Scroll