RSA eFraudNetwork World’s largest cybercrime and fraud monitoring community
RSA eFraudNetwork is a cross-organization, cross-industry data repository of fraud profiles gleaned from RSA's worldwide network of customers, end users, and Internet service providers (ISPs) as well as from the RSA Antifraud Command Center and third-party contributors. The eFraudNetwork community is dedicated to anonymously sharing and disseminating information on cybercrime activities to help keep its members one step ahead of cybercrime.
When an online fraud pattern or other cybercriminal activity is identified, the associated data, activity profile, and device fingerprints are moved to a shared data repository from which active network members receive updates on a regular basis. The power of eFraudNetwork is the ability to stop fraud in real time whenever and wherever it strikes, around the world.
eFraudNetwork can prevent fraud from occurring to organizations by alerting them to fraudulent information that has already occurred and disseminating that intelligence across the network. Direct feeds on real-time fraud threats are sent to RSA Adaptive Authentication, RSA Adaptive Authentication for eCommerce, RSA Transaction Monitoring, and RSA Identity Verification.
These ongoing updates enable real-time, proactive protection to hundreds of millions of online users worldwide. In addition to catching online fraud, the network identifies information associated with cybercriminals' infrastructures used for both financial and nonfinancial attacks.
Data and Spec Sheets
RSA Adaptive Authentication
Balance security and usability to achieve risk-based authentication.
Stop and prevent phishing, pharming, and Trojan attacks as well as rogue apps in the online channel.
RSA Identity Verification from LexisNexis
Use dynamic, knowledge-based authentication to validate user identities and reduce the risk of identity impersonation and fraud.
RSA Transaction Monitoring
Detect and protect in real time against online and mobile fraud including sophisticated man-in-the-browser attacks.