How it works

Every visitor to your website leaves a digital fingerprint.  This includes the information they provide to you such as their name, address, and even banking information. 

But it also includes tens of thousands of data points related to HOW visitors interact with you, including the device they use, the time, order, and methods they use to fill out and move between fields, and much more.

Behind the Scenes

Plum uses a single line of code to capture and hash applicant data in real-time, and securely transmit it to our proprietary fraud detection models.

  • Bot-Generated Applications

    Identifies behaviors specific to bot attempts

  • Drophouses

    Identifies cross-program and inter-program drophouses

  • Stolen & Synthetic Identities

    Identifies stolen, synthetic, and shared identities and components of identities

  • Foreign IPs

    Identifies IP spoofing and foreign origination

  • Suspicious Devices

    Identifies suspicious devices and devices used on multiple applications

Our fraud detection algorithms identify aberrant behavior to create a composite risk score for each applicant interaction.

This allows you to decide whether or not to allow the interaction to move forward - whether it is a new account application or a modification to an existing account.

Seconds Later…

92

Applicant Risk Score

We return an applicant risk score to you

Auto Approve

Verify

Auto Deny

Based on your selected risk tolerances, these risk scores funnel applicants into your designated workflow processes

You decide how and when to use the risk score in your approval processes.

See the Results

Visit your dashboard at any time to view the results of the Plum system, configure your models, tune thresholds, turn models on or off, or even preview the results of models before turning them on.

Our Security

Plum’s databases and algorithms are designed with the express intent to use zero PII. Plum uses secure hashing algorithms, within your computing environment, to scramble PII data before transporting it to Plum's systems. We will not ask for and will not receive, use, or store PII.

We believe private information should stay private.  

Questions before getting started?