How It Works
From data collection to instant action — Risk Signals flow seamlessly into your systems, giving you real-time visibility and control at every step.
Fraudsters don’t always act through accounts — they manipulate devices. They root phones, inject code, spoof GPS, clone apps, use proxies or VPNs, reset devices, or stream screens to bypass controls. Traditional fraud systems miss these signals. Your defense needs to work deeper — at the device & runtime layer.
IdentX Risk Signals detects hidden threats in real time, giving you confidence in which devices are safe and which need intervention.
Fraud often hides beneath account-level signals. Risk Signals surface device-level manipulation attempts that traditional systems can’t see.
From rooting and spoofing to virtualization and screen sharing, attackers adapt. Risk Signals evolve with them, so your defenses don’t fall behind.
Detect risky devices silently in the background. Legitimate users enjoy seamless access, while only high-risk sessions are challenged.
From data collection to instant action — Risk Signals flow seamlessly into your systems, giving you real-time visibility and control at every step.
1
SDKs on iOS and Android gather runtime, OS, network, and environment data in real time.
2
Each device is analyzed across multiple risk indicators, scored, timestamped, and contextualized.
3
Risk data streams to your backend via API or webhook, ready for rules, logic, or fraud engines.
4
Automated actions follow instantly — block, challenge, step-up auth, or isolate risky sessions.
Here’s a high-level view of the signals you’ll get (not exhaustive):
| Risk Indicator | What it detects | Why it matters |
|---|---|---|
| App Repackaging and Tampering Detection | Prevents distribution of malicious or backdoored versions. | Detects if the app package has been modified. |
| App Cloning Detection | Flags cloned instances of the app on the same device. | Stops multi-account abuse and referral farming. |
| Network Security and VPN Detection | Detects VPNs, proxies, or insecure network conditions. | Reveals IP masking, geo-bypass attempts, and potential MITM risks. |
| GPS Spoofing Detection | Identifies manipulated location data. | Blocks location fraud and geo-restricted abuse. |
| Real-time Screen-Sharing Detection | Detects screen sharing during sensitive workflows. | Prevents collusion, remote access, and takeovers from modified app packages. |
| Factory Reset Detection with Timestamp | Detects device factory resets and provides the exact timestamp. | Helps correlate suspicious resets with fraudulent activity. |
| Debugger Detection | Flags active debugging attempts. | Stops runtime inspection and tampering during app execution. |
| Emulator and Virtual OS Detection | Identifies virtualized devices used in large-scale fraud. | Blocks emulator farms and automated fake accounts. |
| Root Detection | Identifies rooted or jailbroken devices that bypass OS protections. | Rooted devices allow malicious apps and unauthorized code injection. |
| Hooking Detection | Detects runtime hooking tools such as Frida, Xposed, and Magisk. | Prevents code tampering, security bypass, and reverse engineering. |
From banking to gaming, flexible protection for every use case.
Secure transactions, detect fraud, and build trust across financial platforms.
Prevent abuse, ensure fair play, and protect high-volume digital ecosystems.
Block GPS spoofing, secure trips, and maintain rider-driver trust.
Start uncovering hidden threats in your mobile traffic today. Integrate IdentX Risk Signals to enrich your decisioning, reduce fraud, and improve user trust — all with minimal friction.