Plum Identity Solutions for the Public Sector

How does Plum work?

Every visitor to your website leaves a digital fingerprint.  This includes the information they provide to you such as their name, address, and even banking information. 

But it also includes tens of thousands of data points related to HOW visitors interact with you, including the device they use, the time, order, and methods they use to fill out and move between fields, and much more.

Behind the Scenes

Plum uses a single line of code to capture and hash applicant data in real-time, and securely transmit it to our proprietary fraud detection models.

  • Bot-Generated Applications - Identifies behaviors specific to bot attempts
  • Account Takeovers - Identifies legitimate accounts hacked to redirect payments
  • Drophouses - Identifies cross-program and inter-program drophouses
  • Stolen & Synthetic Identities - Identifies stolen, synthetic, and shared identities and components of identities
  • Suspicious Devices - Identifies suspicious devices and devices used on multiple applications

Our fraud detection algorithms identify aberrant behavior to create a composite risk score for each applicant interaction. This allows you to decide whether or not to allow the interaction to move forward - whether it is a new account application or a modification to an existing account.

We return an applicant risk score to you. Based on your selected risk tolerances, these risk scores funnel applicants into your designated workflow processes