Welcome!

News Feed Item

When Credit Card Validation Isn't Enough: New Solutions To Prevent Fraud in The Online Retail Market

Service Objects' latest product helps to quickly identify fraudulent transactions by authenticating the validity of customer information before the order reaches credit card processing.

SANTA BARBARA, Calif., March 26, 2014 /PRNewswire/ -- In today's world of open proxy networks like Tor, stolen credit cards and elaborate hacking schemes; virtual fraudsters have ample ways to steal from online retailers. The impact is felt globally – according to the Association of Certified Fraud Examiners (ACFE) organizations around the world lose an estimated five percent of their annual revenues to fraud. By putting the right checks and balances into place, retailers can proactively avoid fraudulent online transactions while simultaneously ensuring valid customers receive the highest quality of service.

Logo - http://photos.prnewswire.com/prnh/20140326/CG91013LOGO

A new solution to help fight this battle is DOTS Order Validation. Available now at serviceobjects.com, DOTS Order Validation is a real-time fraud protection API that verifies, standardizes and authenticates customer order information.

Decreasing Fraud in Real-Time

"Enough is enough – smart retailers are leveraging big data to weed out bogus online transactions. We can now compare the location of the shopper's computer with the phone and mailing address to identify fraud," said Geoffrey Grow, CEO of Service Objects. "Although a credit card may be valid, retailers need to examine all the information submitted by shoppers. DOTS Order Validation does exactly this – highlighting any irregularities by reviewing over 200 data points to ensure orders are genuine, accurate and deliverable. All in less than one second."

The ACFE further reveals in the 2012 Report to the Nations on Occupational Fraud & Abuse that organizations have faced a potential total fraud loss of more than $3.5 trillion worldwide. DOTS Order Validation is designed to lower this number by validating key pieces of data in real-time and alerting business to potential harmful transactions.

Data that is reviewed and compared includes shipping and billing addresses, Bank Identification Numbers (BIN), phone numbers, email addresses, geolocation and IP addresses. After a verification process, a 0-100 quality score is assigned, flagging the transaction as "Pass," "Review" or "Fail." With this knowledge, retailers can choose to stop fulfillment, call the shopper for additional information or proceed with the order.

The Service Objects Difference

DOTS Order Validation goes beyond standard contact and customer information verification. This product normalizes and cross validates data the moment the customer hits "submit order" and compares it against multiple discrete databases within the Service Objects master database to determine the validity and authenticity of the incoming transaction.    

Additional benefits and features include:

  • Ensures shipping and billing address outputs are validated, standardized and corrected to USPS mailing address
  • Reduces chargeback fees from credit card processing
  • Flags irregularities in IP address and customer provided addresses
  • Validates billing and shipping phone numbers, email addresses and contact names
  • Provides flags when the credit card is from a country of high risk
  • Allows for improved shipping times to customers when addresses are accurate, in turn, increasing customer satisfaction

For more information about DOTS Order Validation and other Service Objects products, contact [email protected] or connect with us on Twitter @serviceobjects.

About Service Objects

Founded in 2001, Service Objects is the leading provider of real-time contact validation services. Its validation and location web services allow businesses to identify potentially fraudulent transactions, append additional contact information and process transactions in a more efficient manner. The Company works with major brands like American Express, LendingTree and Amazon; and it has validated over 1.8 billion contacts. For a full listing of contact validation products, visit www.serviceobjects.com.

SOURCE Service Objects

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
SYS-CON Events announced today that CAST Software will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CAST was founded more than 25 years ago to make the invisible visible. Built around the idea that even the best analytics on the market still leave blind spots for technical teams looking to deliver better software and prevent outages, CAST provides the software intelligence that matter ...
SYS-CON Events announced today that Golden Gate University will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Since 1901, non-profit Golden Gate University (GGU) has been helping adults achieve their professional goals by providing high quality, practice-based undergraduate and graduate educational programs in law, taxation, business and related professions. Many of its courses are taug...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Translating agile methodology into real-world best practices within the modern software factory has driven widespread DevOps adoption, yet much work remains to expand workflows and tooling across the enterprise. As models evolve from pockets of experimentation into wholescale organizational reinvention, practitioners find themselves challenged to incorporate the culture and architecture necessary to support DevOps at scale.
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
As more and more companies are making the shift from on-premises to public cloud, the standard approach to DevOps is evolving. From encryption, compliance and regulations like GDPR, security in the cloud has become a hot topic. Many DevOps-focused companies have hired dedicated staff to fulfill these requirements, often creating further siloes, complexity and cost. This session aims to highlight existing DevOps cultural approaches, tooling and how security can be wrapped in every facet of the bu...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.