Introducing the PerimeterX Automated Fraud Benchmark Report

Automated Fraud Benchmark Report

Our first benchmark report uncovers hidden trends and provides unique insights into automated fraud gleaned from billions of anonymized online interactions by real users and bots across hundreds of the world’s largest shopping sites.

The COVID-19 crisis pushed businesses’ global digital transformation priorities into overdrive. Online traffic spiked. Fear of the pandemic drove entire business sectors from mostly offline to mostly online. Grocery shopping, for example, was a niche pursuit prior to the pandemic. The number of consumers buying groceries online doubled during the pandemic to 52% of all shoppers. From Instacart to Amazon to WalMart, we live in a digital world where shoppers prefer to use a company’s website or web app to discover and shop for products and to interact with brands.

At PerimeterX, we have had a front-row seat at this inevitable transformation of the global economy. Our platform is trusted with blocking automated fraud against hundreds of the world’s leading websites. The crucial first step in that process is to identify the nature of the traffic attempting to access these websites and web apps. Traffic and attack trends are what actually drive the intelligence of our machine learning systems, and with more and more exposure they improve over time.

We wanted to share our insights with the world and are introducing the first PerimeterX Automated Fraud Benchmark Report: 2020 E-commerce Edition. This report examines the latest trends in automated fraud witnessed by our research team. The findings are extracted from anonymous data captured from billions of live online interactions by millions of consumers and hundreds of millions of malicious and non-malicious bots across the world’s largest websites, web apps, mobile apps and application programming interfaces (APIs). Data in this report was collected during 2020; we anticipate using it as a basis for comparison in future years, (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: