Proof Defend is built into our platform and designed to screen every signature and every transaction. Whether your customer needs to sign, notarize, or verify their identity, Defend runs identity and behavioral data through a comprehensive analysis to help provide trust in every transaction.
Who this is for
This content is for organizations interested in Proof Defend.
If you're interested in this feature, contact your Customer Success Manager (CSM) or contact our sales team.
How it works
Defend analyzes hundreds of risk signals to flag suspicious activity or transactions that might be a result of a stolen or synthetic identity. Defend uses variables like email, phone, and location to analyze hundreds of different signals in addition to AI-powered models to determine if that pattern of signals is a risk and needs your attention.
Track your customer’s identity profile across multiple touch points to step up (or step down) your verification approach dynamically, and receive real time alerts of suspicious activity. You can also download a detailed report of an individual's identity report for your records.
When Proof Defend is enabled, you have access to the features below.
- Full Identity Report on signers
- Identity timeline
- Risk score
- Detailed risk signals
- Deepfake detection on videos
You can also control which members of your team can access Defend features.