CT6.® Assistive Technologies
CT6.® Fraud Preventer can be customized with assistive technologies to fit any corporate enterprise, organization, or government entity. CT6.® assistive technologies enable an optimum Fraud Preventer experienced based on the requirements of any environment.

Business Intelligence
CT6.® CredProtect proprietary processes (U.S. patent pending) provide the most comprehensive search of login credentials available, powerful enough to uncover hidden connections to compromised credentials (the Known Bad) and credentials stolen but not yet used by criminals (the Identified At-Risk). This insight preemptively stops fraud.
Graph Link-Analysis
CT6.® Graph Link-Analysis provides powerful point and click deep-link analysis on common data attributes (e.g., phone numbers, IPs, device IDs, financial transaction information, etc.).
- Graphs hidden links between points of compromise, threat actors, money mules, and other criminals.
- Employs Kaseware (www.kaseware.com) for extreme configurability with limitless applications using current business structures.

Case Management
Fraud Preventer adapts to case management programs (e.g., Kaseware) to allow organizations to form efficient teams of information security specialists, fraud analysts, and investigators. Fights cybercrime through a single pane of glass.
Artificial Intelligence
Calibrate and hone fraud prevention AI programs with Fraud Preventer to reveal the ground truth of actual cyber-criminal access into remote workers, customers, or vendors. Significantly improve the predictive ability of existing AI models. Empower supervised machine learning algorithms to build highly tuned, threat and actor-specific fraud prevention strategies.
Real-Time Prevention
Fraud Preventer highly predictive signals improve real-time prevention programs to better identify risk. Improve fraud prediction for identified customers, employees, and vendors/suppliers. Create highly focused and predictive threat and actor specific risk rules.


Compliance
Fraud Preventer can connect cyber to other required risk management programs (e.g., money laundering, terrorist financing, supply chain & insider threat), and export specific data to government mandated reporting [e.g., Suspicious Activity Reports (SARs)].