Transaction Risk Analysis exemption

Minimize your costs and reduce friction by exempting authorisation or authentication requests from SCA & 3DS2 whenever possible.

Privacy by Design
Hashing of sensitive information

All the sensitive data is hashed which makes it impossible to go back to the end-user


Privacy embedded into Design

Privacy was integrated in the architecture of our IT systems and business practices


Processing Monitoring

Our approach is based on preemptive measures rather than remedial ones


Limit Data Collection, Respect User Privacy

By including strong privacy defaults, we keep the interests of the end-user safe


End-to-end Security Control

From start to finish, our strong security measures ensure a full lifecycle protection of end-user’s data


Access Control

We make sure the access to sensitive information is severely controlled

How it works
Big Data

Enygma analyzes historical data, provides transaction monitoring and risk scores events to prevent fraud and suspicious behavior

Adaptative Behavior Analytics

Enygma’s advanced self-learning models provide a holistic view of customers and identify at-risk activity to reduce chargebacks and false positives

Machine and Deep Learning

Enygma’s fully adaptive machine learning models will ultimately safeguard transactions, provide advanced, explainable anomaly detection and increase acceptance rates thanks to its intelligence-led solutions

Real-time intelligence

Enygma delivers risk intelligence in less than 300 milliseconds

One access, all features
Improved Scoring

Detect financial crime with transactional monitoring and improve your risk management worldwide

Reduced Friction

Reduce chargebacks by 87% and false positive alerts by 95%

Adaptability

Monitor across any type of product or channel to maximize business growth

Machine Learning

Enrich the predictive server and improve the results with machine learning in real time

3DS Control

Reduce your cost by choosing whether to activate 3D Security or not when needed

Features
A turnkey solution for threat detection
Fast Integration

Integrate Enygma with a variety of third-party enterprise systems in just a few hours

Industry Agnostic

No matter who we work with, we are ready to take on any challenge

Easy to Export

Extract data in a wide array of formats to integrate with your already existing reporting software as well as business intelligence tools

Machine Learning

Enrich the predictive server and improve the results with machine learning in real time

Adaptable

Monitor across any type of product or channel to maximize business growth

Reduced Friction

Reduce chargebacks by 50% and false positive alerts by 95%

Analyzed risk-based factors
Spending patterns

The previous spending patterns of the individual payment service user


Location

The location of the end-user and of the merchant at the time of the payment transaction in cases where the access device or the software is provided by the payment service provider


Transaction history

The payment transaction history of each of the payment service provider's payment service users


Abnormal payment patterns

The identification of abnormal payment patterns of the payment service user in relation to the user's payment transaction history