Reduce Credit Card Fraud and Charge backs with Zfraudshield

By: Zighra  09-12-2011
Keywords: credit card

Fraudster techniques becoming more advanced
Techniques used in online card-not-present fraud are becoming more and more sophisticated. Traditional fraud screening tools can only determine if a credit card is legitimate or if the user-entered account information matches those on record. Today, fraudsters can obtain personal credit card information, pose as the legitimate card holder, and bypass standard fraud checks.

Looking at fraud from a different perspective
Zfraudshield Anti-Fraud API fraud screening and fraud prevention tools are able to eliminate fraud at the transaction initiation step. Zfraudshield does this through out of band, two factor authentication through telephone verification.  We examine an online transaction and through telephone verification we ensure that the purchaser has both approved the transaction and is authentic. Our tools are geared towards identifying and authenticating if the purchaser is the legitimate card holder. Through our Zfraudshield Anti-fraud API, we can short circuit the typical fraudster scams that are associated with fraudulent orders. And through our two factor telephone authentication technology we provide e-commerce businesses with the necessary information to detect fraudulent orders before the payment is processed saving you from charge backs, interest rates, and lost goods.

Why Telephone Verification

With ZFraudshield Anti-Fraud API services, verification through the telephone is automated thus saving you time and money without giving up protection. Our telephone verification ensures that your customers provide you with a working, traceable telephone number. As a result, fraudsters are less likely to target your business.

How Zfraudshield Anti-Fraud Telephone Verification works:

1. Online business seeks online customer verification. Payment process awaiting telephone verification.

2. Robotic call generated to number provided by customer or the number on file

3. A numeric code is given to customer that relates to the in-progress web transaction.

4. Customer enters the security code onto phone.

Keywords: credit card

Contact Zighra

Email - none provided

Print this page

Other products and services from Zighra



PCI DSS requires all organizations collecting payment card information to ensure that they use two-factor authentication to identify remote users that need to access resources, whether they are employees, administrators or third parties. While account name and password is typically the easiest and least expensive method of logon authentication, organizations have now started to realize the weaknesses of this method.