PerimeterX Winter 2021 Release: New Capabilities and Integrations

New Capabilities and Integrations

Protecting Your Digital Storefront From Home Page to Checkout

The digital storefront is more important to retailers than ever before. It has become the primary way for consumers to discover, shop and interact with your brand. With the growth in online traffic driven by the pandemic comes an increase in risk as cybercriminals look to take over consumer accounts, steal personal information and empty gift cards and loyalty points. PerimeterX has the important responsibility to protect some of the world’s largest websites and web apps from this increase in threats so that consumers can order groceries online and get access to retail goods from the safety of their homes.

The R&D teams at PerimeterX have been busy enhancing the PerimeterX Platform to enable you to deliver a safe digital experience for your consumers from home page to checkout. Today, we are pleased to announce the Winter 2021 Release of the PerimeterX Platform, which is filled with new features that protect your digital storefront by securing customer accounts against automated attacks, controlling bot traffic to product pages, and protecting payment pages against carding and digital skimming attacks. Check out some of the key features below.

Business Insights Dashboard

We often get asked by our customers to help quantify the business value of bot mitigation. While we have been able to provide this data as needed, we wanted to make it even simpler. PerimeterX Bot Defender features a new Business Insights dashboard that delivers rich executive-level insights on the business impact of bot management on e-commerce sites and helps benchmark one’s site traffic against industry peers. This dashboard helps website owners understand the business value of bot management and make better business decisions for protecting your web and mobile apps, resulting in reduced risk and improved operational efficiency.

Human Challenge: Native (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: