🌟 New Feature Alert! You can now send session data with your events to see what's really happening once your users have logged in. Specifically, you will understand user behavior more comprehensively and identify patterns and anomalies within active sessions.

Why does this matter? This enhancement lays the groundwork for detecting session hijacking and shared session threats, enabling stronger security and a more seamless user experience. πŸš€

How do I set this up? Refer to our API Reference for details on how to send sessionId and targetApp info with your events. βš™οΈ

Check out the API Reference to send us session data with events

Check out the API Reference to send us session data with events

Once you send session data, you can search for and see the enriched information in the Event Explorer

Search in Event Explorer using the **Session ID** or **Application**

Search in Event Explorer using the Session ID or Application

See which Application users accessed in the Events table in Event Explorer

See which Application users accessed in the Events table in Event Explorer

πŸ”” New feature alert! Verosint now detects and notifies you about threats on your platform, including credential stuffing attacks and account takeovers. These insights are obvious, actionable, and easy to verify, so you know exactly what next steps to take when these threats occur.

Introducing Threat Insights!

Introducing Threat Insights!

Set up email notifications so you never miss out on threats!

Set up email notifications so you never miss out on threats

Example credential stuffing attack email notification

Example credential stuffing attack email notification

πŸ’œ We're always looking to improve your experience. Verosint makes it easy to trust, but verify the threats and hidden fraud on your platform. We've added a whole bunch of improvements that make trust, but verify a snap! 🫰

  1. We removed search result limits in Explorer!πŸŽ‰ There used to be a 10,000 records limit in the Events table and a 100 records limit in the Accounts, IPs, Prints, and Emails, and Phones tables. Now when you run a search, you get back all results, paginated neatly. You're welcome.

  2. In the Accounts tab, we replaced the link to the SignalPrint graph with a link to the Account Intelligence page. This makes it easier to drill down into a specific account and see any unusual activity that is worth taking a closer look at.

  3. In the heat map charts in Explorer, we now save the Group By selection you choose in the URL. This way, when you bookmark and send the link to a colleague, they'll see the Group By too!

  4. We added a mobile optimized view of the Verosint application for onboarding! Check out https://app.verosint.com from your πŸ“±mobile device!

πŸ”” New feature alert! You can now enable device fingerprinting with Verosint!

Device fingerprinting uniquely identifies the device used to access a service, and provides an effective layer of security in combating threats by identifying unusual or suspicious device behavior. Enable device fingerprinting with Verosint by:

Device fingerprinting with Verosint enables you to:

  1. Prevent Account Takeovers
  2. Identify New or Unusual Devices
  3. Add Risk-Based Authentication, evaluating the risk of each login attempt to your application

Check out our guide to get set up and running!

πŸ’œ We're always looking to improve your experience. We've made some updates to Explorer that will make it even faster and easier to verify conclusions.

  1. Want to know the exact count of events? accounts? IPs?

    Hover over the count on the specific tab.

    Hover over abbreviated #s to see the exact count

    Hover over abbreviated #s to see the exact count

    You can also scroll down to the bottom right corner of the table to see the total count of results.

  2. In the Events by Type stacked bar chart, we noticed a timezone bug and that the bars would increment in un-intuitive intervals (for example, every 46 minutes 🀯). We fixed this so that the bar chart increments will always be a round number (e.g., daily, 3 hours, 5 minutes, etc.), which should make it easier to read and interpret the data.

πŸ”” We added custom actions to workflows. This allows you to provide whatever string of characters you'd like, to set outcomes in your workflows.

In this example, I created a custom action called "LOGOUT" in the Verosint Account Protection for Logins workflow.

Add custom actions to your workflows

Add custom actions to your workflows

Of course you can always feel free to use our default actions. πŸ˜‰

We actually added 3️⃣ new signals that can be used in workflows to prevent multiple signups from the same IP address:

ip.signupSuccessCount.last24hours

ip.signupSuccessCount.last7days

ip.signupSuccessCount.lastHour

Example of a custom rule in workflows using the ip.signupSuccessCount.last24hours signal

Example of a custom rule in workflows using the ip.signupSuccessCount.last24hours signal

πŸ’œ We're always looking to improve your experience.

We improved your first time user experience with Verosint. After signing up for Verosint, land on the AI Insights page and explore an interactive demo.

Interactive demo of AI Insights

Interactive demo of AI Insights

We also made it easy to discover the Verosint Demo workspace, where you can see our sample demo data in action!

With one click, check out the sample data in Verosint Demo

With one click, check out the sample data in Verosint Demo

Like what you see? Then start streaming your data to get your own AI Insights. Use the "Connect Your Data" pop-up in the bottom right corner.

"Connect Your Data" pop-up provides easy instructions for streaming your data

"Connect Your Data" pop-up provides easy instructions for streaming your data

πŸ’œ We're always looking to improve your experience.

Introducing Workflows (formerly known as Rule Sets)! Workflows enable real-time prevention to block attacks and other types of fraud before the damage is done.

Highlights include:

  • Simple, yet powerful triggers

  • Advanced triggers (with CEL) - all the flexibility, when you need it

  • Adaptive identity proofing lets you send users down the identity verification path when needed

  • Conveniently turn off rules in your workflow without deleting them

πŸ’œ We're always looking to improve your experience.

  1. We fixed a pesky bug in Explorer when filtering by IP address from the heat map. You're welcome!

  2. Some of you mentioned that the wording of the recommendations on the AI Insights cards was confusing. This is fixed, so now it's crystal clear what the recommendation is for a given AI Insight.