Protection using non-invasive and frictionless solutions specifically designed for every single endpoint
The XTN® assessment process is fully automated, based on cutting-edge machine learning algorithms (endpoint profiling) and able to assimilate user habits when using their very own devices (behaviour analytics). Our solutions are always simple and quick to implement and the approach is frictionless for the end user. Moreover, our solutions are specifically designed for the target technology so that as much detail as possible is obtained on threats that are typical for a specific environment.
Correlation of cross-channel and multi-layer information for real-time user risk profiling
XTN® combines real-time, state-of-the-art fraud prevention capabilities based on cutting-edge machine learning algorithms, with all the tools required to support the fraud management process. Users and their digital habits form the core of our approach: this involves considering the previously mentioned assessment elements (posture and digital identity) and pairing them with the information about the operation requested from the service.
XTN® technology is invisible to the end user (frictionless) and enables our clients to customise evaluation logics wherever required, while remaining in full compliance with specific internal policies.
The XTN® digital identification combines maximum security levels and the most fluid user experience imaginable. XTN® technology uses cutting-edge machine learning algorithms to make ongoing decisions on user identity (ability to distinguish human behaviour from robotic/automatic behaviour) assessing various signals in real-time (detection of non-human, non-habitual interactions).
The XTN Cognitive Security Platform® is designed to provide compliance with the standards in force
PSD2 and Strong Customer Authentication: the platform fully complies with the SCA requirements prescribed by PSD2, with specific attention to the mobile endpoint and the report as requested by the standard.
GDPR and privacy-related: the prevention of data breaches relating to user information is also ensured via the protection of endpoints used by users or employees to access sensitive information. XTN® technology enables Customers to have continuous and precise control of endpoint security which provides adequate protection of the user’s sensitive data.