Identity fraud costs businesses billions annually. Verifa collects 150+ fraud signals during every verification — behavioral analysis, device fingerprinting, document forensics, and network intelligence — and aggregates them into a risk score that lets you auto-approve legitimate users while catching fraudsters.
Fraud detection runs automatically on every session through checks that Verifa inserts into your workflow behind the scenes:
You don’t need to add these to your workflow — they’re always there.
For additional fraud protection, you can add these checks to your workflow:
duplicate_detection — Catches repeat applicants across sessionscheck_against_list — Matches against your custom blocklistsVerifa collects signals across six categories:
See Fraud Signals for the complete list with risk weights.
All triggered signals feed into a composite risk score:
The duplicate_detection check finds repeat offenders by comparing hashed
identity attributes across all previous sessions:
Add it to your workflow in the dashboard to catch users attempting multiple verifications. When a duplicate is detected, the session routes to manual review.
Create lists of known bad actors and match incoming sessions against them. Add
the check_against_list check to your workflow to enable matching.
This workflow adds duplicate detection and list checks on top of standard identity verification:
Watchlist screening, risk assessment, and identity cross-reference run automatically on top of whatever you configure. You can use conditional nodes in the workflow builder to route sessions based on the risk score:
See the Creating a Workflow tutorial for how to build this in the dashboard.
Each signal can be configured with one of three actions per organization:
For example, if your users commonly use VPNs, set vpn_detected to ignore.
If you want zero tolerance for virtual cameras, set virtual_camera to block.
Certain signals can trigger an immediate block regardless of the overall risk score:
bot_detected — Headless browser or WebDrivervirtual_camera — OBS, ManyCam, or similarcamera_injection_detected — Fake video injection on mobileintegrity_checksum_mismatch — Tampered signal payloadConfigure which signals trigger hard blocks in your organization settings.
risk_assessment,
duplicate_detection, and check_against_list