How it works
Every visitor to your website leaves a digital fingerprint. This includes the information they provide to you such as their name, address, and even banking information.
But it also includes tens of thousands of data points related to HOW visitors interact with you, including the device they use, the time, order, and methods they use to fill out and move between fields, and much more.
Behind the Scenes
Plum uses a single line of code to capture and hash applicant data in real-time, and securely transmit it to our proprietary fraud detection models.
-
Bot-Generated Applications
Identifies behaviors specific to bot attempts
-
Account Takeovers
Identifies legitimate accounts hacked to redirect payments
-
Drophouses
Identifies cross-program and inter-program drophouses
-
Stolen & Synthetic Identities
Identifies stolen, synthetic, and shared identities and components of identities
-
Suspicious Devices
Identifies suspicious devices and devices used on multiple applications
Our fraud detection algorithms identify aberrant behavior to create a composite risk score for each applicant interaction.
This allows you to decide whether or not to allow the interaction to move forward - whether it is a new account application or a modification to an existing account.
Seconds Later…
77
Applicant
Risk Score
We return an applicant risk score to you
Auto Approve
Verify
✔ Auto Deny
Based on your selected risk tolerances, these risk scores funnel applicants into your designated workflow processes
You decide how and when to use the risk score in your approval processes.
See the Results
Visit your dashboard at any time to view the results of the Plum system, configure your models, tune thresholds, turn models on or off, or even preview the results of models before turning them on.
Our Security
Plum’s databases and algorithms are designed with the express intent to use zero PII. Plum uses secure hashing algorithms, within your computing environment, to scramble PII data before transporting it to Plum's systems. We will not ask for and will not receive, use, or store PII.
We believe private information should stay private.