CT6.® FRAUD PREVENTER

The Next Generation of

Fraud Loss Prevention

CT6 Fraud Preventer® technology delivers the next generation of cybercrime loss prevention. Rooted in the experience of federal investigators of organized cybercrime and adversarial nation-state actors, CT6 Fraud Preventer® creates end-to-end preemptive on-premise or cloud-hosted software solutions powerful enough to alter the risk calculus of adversaries and elevate the enterprise anti-fraud ecosystem.

detect.png

Detect

threats using Fraud Incident Event Management (FIEM)® criminal behavioral analytics-based detection to hunt and identify targeted data from premier all-threat intelligence sources.

disrupt.png

Disarm

cybercriminals and nation-state actors through proactive data matches to preemptively mitigate events before a criminal

event occurs.

defuse.png

Disrupt

nefarious networks or nation-state actors through Indicators of Financial Compromise (IoFC)® Matching Logic that connects internal and external data sets across disparate platforms.

defeat.png

Defeat

cybercriminals by rendering stolen or compromised data useless or continue to monitor activity for future engagement undetected.

CT6.® Fraud Preventer

CT6.® Fraud Preventer technology (U.S. patent pending) delivers the next generation of

fraud loss prevention. Rooted in the experience of federal investigators of organized cybercrime and adversarial nation-state actors, CT6.® Fraud Preventer creates end-to-end preemptive on-premise or cloud-hosted software solutions powerful enough to alter the risk calculus of adversaries and elevate the enterprise antifraud ecosystem.

 

060421_FraudPreventer_FRAUDSTER.png

A

B

C

D

E

Privacy and Search Accuracy Tool

The proprietary process of creating a partial hash or partial-partial hash (digital fingerprint) of data to erase identifiers while improving data matching capabilities. (U.S. Pat. Pend.)

 

Wide Aperture Data Hunting

A proprietary software-based capability that identifies customer, employee, and vendor points of compromise, independent of a connection to an organization, among 23+ billion of pieces of data.  Data types include digital device identifiers, payment cards, login credentials, financial transaction data, and all PII. (U.S. Pat. Pend.) 

 

IoFC® Matching Logic  

A proprietary methodology used to uncover and map hidden connections between disparate and remote data points to expose customer, remote workers, and vendor/supplier risks. IoFC (Indicators of Financial Compromise)® is trademarked as a new way of discovering cybercrime risk. (U.S. Pat. Pend.)

 

IoFC® Cybercrime Risk Signaling

The product of IoFC® Matching Logic, this proprietary software-based capability produces the early warning cybercrime risk indicator that CT6.® users receive to manage and mitigate risk days, weeks, or months before the criminal can commit fraud, theft or sabotage. (U.S. Pat. Pend.)

 

Criminal Behavioral Analytics The process that exposes exactly how the criminal business cycle converts data and access into fraud, theft, and sabotage against a business or organization.  Customize by merging CT6.® risk signals and threat tags with any data or info.

FIND OUT MORE

Download our PDF

Premier software solutions to defeat cyber-enabled fraud and theft.

Protecting your customers, remote workforce, and supply chain.