F5 can recognize devices and digital users online, including when users log in from unusual time zones or when multiple users log in from the same device.
Device Signals
F5 picks up on signals from atypical countries, ASNs located in hosting environments, and unusual time zones associated with ASNs.
Network Signals
Our solution identifies transactions via VPN, anonymizing proxies, or other technologies designed to hide or spoof environments, as well as multiple transactions of the same type from the same device, and previously unseen browser fingerprints. F5 also detects minute changes in a device’s integrity, identity, and legitimacy.
Environment Spoofing Signals
F5 notices typing patterns, such as the keys pressed, typing speed, and suspiciously large amounts of copy and paste, including into first name and last name fields. It looks at the location of a browser window and mouse movement that might indicate copying-and-pasting from a text file.
Behavior Signals
Data Collection
Our application security and online fraud solutions uniquely collect and analyze telemetry signals to block attacks and fraud in real time. Sources include, but are not limited to the following:
HOW DOES IT WORK?