ACCOUNT DEFENDER

Safeguard Online Accounts From Fraud and Abuse

HUMAN helps fraud and security teams neutralize compromised accounts and fake accounts

Human-Account Defender-Header Image

Account Defender safeguards your app and website accounts by detecting and neutralizing compromised and fake accounts.

Using sophisticated behavioral analysis to continuously monitor accounts post-login, HUMAN safeguards organizations’ accounts from fraudulent and abusive activity such as financial fraud, PII harvesting, and free trial abuse.

Account Defender monitors accounts over their entire lifecycle, from registration through post-login usage, assessing all activity for risky and suspicious behavior.

Detect and neutralize compromised and fake accounts

Stop fraud and abuse, reduce customer risk and cut fraud team workloads

Human-Account Defender-See and Stop Fraud

See and Stop Fraud

Continuous risk assessment

Stop fraud and abuse by continuously evaluating accounts over their entire lifetime with an evolving, behavior-based risk score. Not just at login or at the point of transaction.

Human-Account Defender-Reduce Customer Risk

Reduce Customer Risk

Automated response to threats
When risk is detected, respond quickly without the need for manual intervention. Keep customers safe by automatically resetting passwords, locking accounts, or taking any other appropriate action.
Human-MediaGuard-Optimize Return

Cut Investigation Time

Get answers fast
Reduce time spent investigating with an intuitive console that highlights key details of an incident. Quickly share important information by choosing from multiple pre-written reports or customizing your own.

Secure your online accounts post-login

Protect your accounts from registration through post-login usage against:

Human-Account Defender-Compromised Accounts
Compromised Accounts
Human-Account Defender-Fake Account Creationpng
Fake Account Creation

How you win with
Account Defender

Account Defender secures your accounts by answering the questions “are these users who they say they are?” and “should they be doing what they are doing?”

Continuous Risk Assessment
In today’s fraud ecosystem, it is no longer enough to conduct only a point-in-time security check, such as at login or point of transaction. Stopping fraud and abuse requires continuous risk assessment of accounts over their lifecycle, constantly examining them for signs of compromise and suspicious activity.

Account Defender evaluates users’ post-login activities, using behavioral signals that generate an evolving risk score. All actions are examined for suspicious and anomalous activity, such as unusual login patterns, changing geo-location, and different networks.
Monitor the Account Lifecycle

Account Defender secures accounts over their entire lifecycle, reducing risk for you and your customers.

When an account meets a risk threshold, Account Defender responds with automated action, for example: calling APIs, introducing hard blocks, redirecting to a cognitive challenge, or redirecting to a page that works with an organization’s business flow or customer identity access management (CIAM) tool. It works the way you do, without the need for manual intervention from your fraud team.

Easy to Deploy and Use

Account Defender saves busy fraud teams time with fast access to critical data. Quickly understand what triggered an incident and the taken response action. Share knowledge with the wider team by accessing multiple template reports, as well as the ability to create custom reports.

It works in tandem with existing CIAM systems, SIEMs and ticketing systems to strengthen end user experience.

Human-Account Defender-Continuous Risk Assesment@2x
Continuous Risk Assessment
In today’s fraud ecosystem, it is no longer enough to conduct only a point-in-time security check, such as at login or point of transaction. Stopping fraud and abuse requires continuous risk assessment of accounts over their lifecycle, constantly examining them for signs of compromise and suspicious activity.

Account Defender evaluates users’ post-login activities, using behavioral signals that generate an evolving risk score. All actions are examined for suspicious and anomalous activity, such as unusual login patterns, changing geo-location, and different networks.
Human-Account Defender-Monitor the Account Lifecycle@2x
Monitor the Account Lifecycle

Account Defender secures accounts over their entire lifecycle, reducing risk for you and your customers.

When an account meets a risk threshold, Account Defender responds with automated action, for example: calling APIs, introducing hard blocks, redirecting to a cognitive challenge, or redirecting to a page that works with an organization’s business flow or customer identity access management (CIAM) tool. It works the way you do, without the need for manual intervention from your fraud team.

Human-Account Defender-Easy to Deploy and Use@2x
Easy to Deploy and Use

Account Defender saves busy fraud teams time with fast access to critical data. Quickly understand what triggered an incident and the taken response action. Share knowledge with the wider team by accessing multiple template reports, as well as the ability to create custom reports.

It works in tandem with existing CIAM systems, SIEMs and ticketing systems to strengthen end user experience.

Safeguarding online accounts from fraud and abuse

“Account Defender gave us real-time detection with context-aware actions that provide immediate visibility into previously unknown account takeover attacks enabling us to significantly reduce fraud and help desk calls.”

 
— CISO at Top 3 Freelance Marketplace

Seeing Account Defender in action for yourself is believing.

How Account Defender works

Fast deployment and straightforward configuration
HUMAN-Account Defender-How Account Defender Works
Human-Account Defender-Detect

Detect

The Sensor and Enforcer send signals that are profiled and detected for anomalies in user behavior from past actions, pattern matching, statistical baselines, and device forensics.
Human-Account Defender-Intervene

Intervene

Automated custom interventions are taken that include calling customer APIs, introducing hard blocks, redirecting to a challenge or to a page that works with an organization’s business flow or CIAM.

Human-Account Defender-Report

Report

The console features advanced investigation tools and reporting. Quickly understand an incident and share knowledge with template and custom reports.

Key integrations

Secure your online accounts against fraud and abuse by easily integrating Account Defender with your existing infrastructure.

Edge Integration (CDN, Cloud)
Load Balancers & Web Servers
Human Security-Key Integrations-Apache
Human Security-Key Integrations-Citrix NetScaler
Human Security-Key Integrations-f5
Human Security-Key Integrations-Haproxy
Human Security-Key Integrations-Varnish Cache
Human Security-Key Integrations-Kong
Human Security-Key Integrations-Ngnix
Human Security-Key Integrations-Apigee
Human Security-Key Integrations-Envoy
Human Security-Key Integrations-Cowboy
Application SDK/Middleware
Human Security-Key Integrations-PHP
Human Security-Key Integrations-NodeJS
Human Security-Key Integrations-Python
Human Security-Key Integrations-Ruby
Human Security-Key Integrations-Java
Human Security-Key Integrations-ASP.NET
Human Security-Key Integrations-Heroku
Serverless & Cloud Frameworks
Human Security-Key Integrations-Azure Active Directory
Human Security-Key Integrations-App Engine
Human Security-Key Integrations-Google Cloud Functions
Human Security-Key Integrations-Kubernetes
User Identity Platforms
Human Security-Key Integrations-Azure Active Directory
Human Security-Key Integrations-Okta Logo
Human Security-Key Integrations-Ping Identity Logo
E-Commerce Platforms
Human Security-Key Integrations-Salesforce Commerce Cloud
Human Security-Key Integrations-Magento
Human Security-Key Integrations-Marketo
Human Security-Key Integrations-Drupal
Logs & Metrics
Human Security-Key Integrations-Adobe Analytics
Human Security-Key Integrations-Google Analytics
Human Security-Key Integrations-Datadog
Human Security-Key Integrations-Splunk
Vulnerability Intel
Human Security-Key Integrations-Synk

Featured Resources