ProPay Teams To Help Companies Battle Fraud

TSYS’ ProPay has paired up with InfoTrax to help direct selling companies battle fraudsters by integrating ProPay’s Guardian CyberShield fraud detection and protection service into its DataTrax back-office software.

Because Guardian CyberShield offers a comprehensive layered payment fraud solution to stop fraudulent transactions, this enables companies to reduce chargeback costs. This cloud-based, real-time identity verification tool also helps validate returning customers/prospects; it also protects transactions types, including account creation, login authentication and payment authorization. It is also used to prevent account takeover, payment fraud, identity spoofing, malware and data breaches.

“We’re pleased to team up with InfoTrax to begin offering Direct Selling companies more sophisticated fraud prevention and detection tools,” said Dave Duncan, president of ProPay. “ProPay Guardian CyberShield, is just another example of our desire to provide a suite of payment solutions that allows our customers to focus on running their businesses while protecting them against fraud.”

As PYMNTS’ research shows, fraud attacks between 2014-2015 were up 163 percent, particularly as fraudsters grow increasingly sophisticated.

“We are seeing bands of sophisticated criminals targeting Direct Selling companies,” said Mark Rawlins, chief executive officer of InfoTrax. “Understanding how these groups work and helping our clients avoid these pitfalls have always been a part of InfoTrax’s commitment as a software provider. Working with ProPay to have this directly integrated with our enterprise solution creates one more layer of protection embedded in our service.”

ProPay Guardian CyberShield enables companies to:

  • Confidently approve transactions from legitimate, trusted users
  • Receive automatic alerts to developing threats as they materialize across the globe
  • Obtain a benchmark of best practices that can be utilized to develop and fine-tune policies and rules
  • Avoid transactions from devices compromised by malware
  • Implement step-up measures and manual reviews for suspect transactions or transactions that exceed a risk threshold specific to their business
  • Deny high-risk transactions from known bad actors