Guides, case studies, and insights for device intelligence
Explore practical content for fraud teams and engineers: device fingerprinting fundamentals, mobile security strategies, and real-world outcomes.
What you will find here
Deep ID resources are built to help you ship safer customer journeys. Use them to design policies, reduce false positives, and prevent automation and mobile-first fraud.
Guides
Deep dives and practical playbooks for fraud and security teams.
A guide to fraud measurement: what to track for risk scoring and policy decisions, including outcomes, control metrics, and how to improve without increasing false positives.
Why cookies fail for fraud prevention and how device identity improves recognition, policy enforcement, and fraud ring detection without relying on brittle tracking.
Root/jailbreak checks are not enough. Learn the limitations, common bypasses, and how layered device + SIM intelligence improves mobile fraud detection.
How to stop bots without harming conversion: detect automation with device identity and Smart Signals, and reserve challenges for high-risk sessions only.
A practical framework for step-up authentication: tiered enforcement, where to apply step-up first, and how device intelligence reduces friction for trusted users.
SIM swap and number recycling both break phone-number trust. Learn the differences, what to detect, and how device + SIM intelligence reduces risk without hurting users.
Case Studies
Real outcomes from teams using device intelligence to reduce fraud and friction.
How a fintech reduced SMS fraud: detect SIM swaps, flag instrumented devices, apply tiered OTP policies, and measure OTP cost and takeover outcomes.
How a marketplace reduced promo abuse using device identity: targeted enforcement tiers, fewer false positives than IP blocks, and improved net revenue outcomes.
Webinars
Live sessions and walkthroughs from product and security leaders.
A recap of our Device Intelligence 101 webinar: how device ID + Smart Signals reduce fraud and false positives, and a rollout plan for fraud and growth teams.
Want a tailored rollout plan?
We will help you choose the right events, signals, and policies for your threat model.
