A behavioral approach to device fingerprinting

A behavioral approach to device fingerprinting

| | Product
BackgroundOnline businesses connect with their customers over the internet through a device, like a laptop or phone, using a web browser or an app. Having insights into these devices can help a business ensure the person they are interacting with is legitimate. For existing customers, having a list of ... Read More
Introducing the Event Explorer

Announcing the Event Explorer

| | Product
Today, Castle is releasing the Event Explorer, giving security and fraud teams a new way to discover and investigate malicious activity ... Read More
Introducing the Detection of Multi-Accounting

Introducing the Detection of Multi-Accounting

| | Product
With multi-accounting detection, you are better able to protect against account takeovers involving a single device. Also, you can now catch users who are abusing marketing incentives, such as coupons, new-account rewards or new customer referral bonuses ... Read More
Castle's API enhanced with Risk Signals

Castle’s API enhanced with Risk Signals

| | Product
We're excited to introduce Risk Signals! While Risk signals have always been a part of Castle's risk assessment engine, these signals are now available for your direct use with this release. This allows you to enrich your own data sets with a wealth of new information ... Read More
Reducing Signup & Login Friction

Reducing Signup & Login Friction

| | Product
Does reducing friction help a business grow? Can security teams take friction away from users and make authentication seamless? “High-grade security” coupled with “low to no friction” is the future of successful online engagement between companies and their users. This post explores those topics ... Read More

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)