Behavior insights

Uncover fraud with passive signals

Analyze behavioral, device, and network signals to identify risk without interrupting the user experience.

Folio Behavior Insights dashboard showing user activity signals and risk scoring

Passive signals for smarter fraud detection

Fraud detection in real time

Quietly collect behavioral and device signals to identify risk in real time and respond instantly with the right level of friction.

Repeat fraud detection

Link devices, IP addresses, and user behavior to surface repeat offenders and coordinated fraud patterns automatically.

User risk enrichment

Combine background signals into a single risk view to support confident decisions across the entire user lifecycle.

How it works

Built in risk intelligence

Evaluate each session with an adaptive risk model trained on real world identity patterns across your user base.

Folio risk intelligence engine analyzing transaction patterns for fraud detection

Key features

Automatically gather passive signals that add context to every user session.

Practical uses of passive signals

Real time adjustment

Dynamically increase or reduce verification steps when risky behavior such as VPN usage or unusual access patterns is detected.

Account takeover protection

Identify suspicious logins by comparing location, device, and network signals against known user behavior.

Linked account detection

Reveal duplicate or connected accounts by analyzing shared devices, networks, and behavioral attributes.

Smart review routing

Automatically send high risk sessions to manual review instead of forcing instant approve or deny decisions.

Let's build better identity verification

Talk to our team to explore how Folio can enhance your onboarding and verification experience.

Explore more

ID verification

Verify passports, ID cards, and other official documents.

Learn more: ID verification

NFC identity scan

Read secure chip data from compatible IDs and passports.

Learn more: NFC identity scan

Document intelligence

Extract and analyze data from submitted documents.

Learn more: Document intelligence

Face match

Compare a selfie to an official photo to confirm identity.

Learn more: Face match

Liveness check

Confirm that the user is physically present.

Learn more: Liveness check

Data source checks

Validate user information against trusted databases.

Learn more: Data source checks

Phone and email validation

Confirm ownership and detect risky contact details.

Learn more: Phone and email validation

Dynamic flow

Coordinate identity checks with flexible logic.

Learn more: Dynamic flow

Review workspace

Organize and resolve verification cases.

Learn more: Review workspace

Credential issuance

Create and deliver verifiable credentials to wallets.

Learn more: Credential issuance