ThreatMetrix, The Digital Identity Company, unveiled at the RSA Conference its innovation in the fight against global cybercrime – the Digital Identity Graph. Radically different than the Social Graph popularized by Facebook, ThreatMetrix has developed the graph framework for anonymized global digital identities on the internet to fight cybercrime.
The Digital Identity Graph maps the complex and ever-changing associations among people and their communication devices, account credentials, telephone numbers, physical addresses and the businesses with which they interact. Using the underlying graph framework, ThreatMetrix can define digital persona relationships on a global scale, enabling businesses to identify fraud and cyberattacks with real-time speed and precision without compromising privacy.
The Digital Identity Graph framework is a data science and engineering achievement with multiple far-reaching applications. ThreatMetrix anticipates that these concepts will be adopted broadly and yield enduring value for the security and fraud prevention industry as a whole.
“Establishing authentication in today’s global and digital economy is incredibly complex – ask anyone working in fraud prevention, enterprise information technology, or even the front lines of small businesses all over the world,” said Armen Najarian, chief marketing officer while talking to DynamicCISO at the RSA Conference 2016.
“We believe that our achievements mapping the Digital Identity Graph will pave the way for broad industry adoption and aid in solving unique authentication challenges confronting the public and private sectors,” said Najarian.
“The Digital Identity Graph allows us to leapfrog established authentication procedures that are widely known in the analog world,” said Andreas Baumhof, chief technology officer. “For example, the traditional credit bureau model of authentication based on knowing a name, physical address or social security number is rapidly becoming outdated and irrelevant. This static information is already known to fraudsters due to numerous data breaches. The power of the graph is knowing when your information is used out of context – without even needing to know who you are. In milliseconds, we can differentiate between a cyber attack and a trusted user without compromising privacy.”
Subscribe to our newsletter for all the latest updates and special offers.
Click Here To view archive additions