Skip to Main Content

Spec Secures $15M Series A Funding, Accelerating Innovation in Fraud Defense

Back to resources

Blog

Why we fight fraud at the edge of the internet

Blog resources
fraud NoCode technology

Reimagine fraud defenses: detect & combat fraud at the edge, empowering fraud fighters to take action directly from the Spec Platform.

We do things differently at Spec, and there’s a good reason why. My co-founder Patrick Chen and I spent the better part of our careers working with fraud defense teams at some of the largest brands in the world, this gave us great perspective on what isn’t working. While there are breakthroughs in fraud detection technologies every year, we know that the difference between good fraud defense and great fraud defense is driven primarily by where fraud is fought, not how.

The best place to fight fraud is at the edge of the internet.

Legacy fraud defense infrastructure

To protect any given customer experience, fraud defense teams typically run this playbook:

  • Collect data for key checkpoints in the customer journey
  • Get additional information from third-party fraud data vendors
  • Deploy defenses against a well-defined fraud pattern

This is painting with broad strokes, but captures the gist of what is done to protect a given customer experience.

Why do fraud defenses fall behind?

Fraud is a highly dynamic problem that requires you to adjust your defenses to keep pace with changes. Most commonly, these changes come from:

  • Updates to the customer experience
  • Evolving attacker tactics
  • Fraud detection solutions that need to be updated or replaced

‍Fraud teams can stay on top of this continual evolution with legacy fraud defenses, but it requires support and prioritization from technical teams to keep everything running smoothly.

Modern fraudsters attack the entire customer experience

Fraud has changed over the last decade. Today’s fraudsters have mountains of breach data, sophisticated no-code tools, and huge support communities that make it easy to launch sophisticated attacks.

Traditional fraud defense infrastructure gets more and more difficult to maintain as defenses are fragmented across the customer journey. Each customer experience checkpoint generates a specific kind of data and requires support from different types of fraud detection vendors. Adding more siloed checkpoints adds unsustainable complexity, so many parts of the customer journey go entirely unprotected.

Increasingly, the best fraud risk signals to protect a customer experience are sourced from a different checkpoint in the customer journey.

As an example, at a modern payment fraud checkpoint, that checkpoint doesn’t know that the account was one of thirty that the user logged into in the last week and that they recently changed their shipping address and contact details. This data is locked up in siloed fraud checkpoints elsewhere in the customer journey, or not persisted at all.

‍Getting data from the entire customer experience to accurately detect high-risk orders at the time of payment is incredibly difficult, but modern fraud dictates that it’s exactly the kind of data a successful fraud defense needs.

‍Fraud defense at the edge of the internet

We needed to take the technical complexity out of defending against modern fraud attacks and make it easy for any business to protect their entire customer experience. This triggered a big re-think of where fraud gets fought. Instead of building defenses that have to be manually integrated across checkpoints, we built a solution to detect and defend against fraud at the edge of the Internet, close to the users themselves.

‍This approach is a big change from what the fraud industry has done for the last two decades. We’re assessing fraud and identity risk from outside the firewall and giving fraud fighters the ability to take action directly from our platform. From this platform, fraud defense teams have end-to-end visibility of the customer journey and access to internal and external risk data at any given checkpoint – all without having to write a single line of code.

Our approach is a big change from how the world has fought fraud over the last two decades and it has our users completely rethinking what fraud defense should look like. We think it’s about time.

Was this article helpful?

Yes, thanks!
Not really.
Thanks for your feedback!

Related resources

Spec is a trusted partner for organizations to detect, protect, and respond against an array of potential threats. This holiday season, cyberattacks inevitably will disrupt businesses globally. If your business is under attack, Spec’s Incident Response Engagement can help.
If your business is under attack, Spec’s Incident Response Engagement can help.
The world of cybersecurity is evolving at an unprecedented pace, and the emergence of artificial intelligence (AI) as a formidable player in the field has been a game-changer. AI is not just a buzzword; it's a potent tool that's being harnessed by cybercriminals to launch increasingly sophisticated attacks. As we look ahead to 2024 and beyond, it's evident that the surge in AI-powered attacks is a trend that shows no signs of slowing down.
all resources