Case Studies
    ANDOR
  • (5,794)
    • (2,602)
    • (1,765)
    • (764)
    • (622)
    • (301)
    • (236)
    • (163)
    • (155)
    • (101)
    • (94)
    • (86)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,073)
    • (2,519)
    • (1,260)
    • (761)
    • (490)
    • (436)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,407)
    • (1,774)
    • (1,292)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,157)
    • (2,048)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,488)
    • (1,262)
    • (472)
    • (342)
    • (225)
    • (181)
    • (150)
    • (142)
    • (140)
    • (127)
    • (97)
    • View all
  • View all 15 Technologies
    ANDOR
  • (1,732)
  • (1,626)
  • (1,605)
  • (1,460)
  • (1,423)
  • (1,411)
  • (1,313)
  • (1,178)
  • (1,059)
  • (1,017)
  • (832)
  • (811)
  • (794)
  • (707)
  • (631)
  • (604)
  • (595)
  • (552)
  • (500)
  • (441)
  • (382)
  • (348)
  • (316)
  • (302)
  • (295)
  • (265)
  • (233)
  • (192)
  • (191)
  • (184)
  • (168)
  • (165)
  • (127)
  • (116)
  • (115)
  • (81)
  • (80)
  • (63)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
    ANDOR
  • (5,781)
  • (4,113)
  • (3,091)
  • (2,780)
  • (2,671)
  • (1,596)
  • (1,471)
  • (1,291)
  • (1,013)
  • (969)
  • (782)
  • (246)
  • (203)
  • View all 13 Functional Areas
    ANDOR
  • (2,568)
  • (2,482)
  • (1,866)
  • (1,561)
  • (1,537)
  • (1,529)
  • (1,126)
  • (1,027)
  • (907)
  • (695)
  • (647)
  • (604)
  • (600)
  • (521)
  • (514)
  • (514)
  • (491)
  • (423)
  • (392)
  • (363)
  • (351)
  • (348)
  • (341)
  • (312)
  • (312)
  • (293)
  • (272)
  • (243)
  • (238)
  • (237)
  • (230)
  • (217)
  • (214)
  • (208)
  • (207)
  • (204)
  • (198)
  • (191)
  • (188)
  • (181)
  • (181)
  • (175)
  • (160)
  • (155)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (113)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (80)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (60)
  • (59)
  • (58)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (26)
  • (26)
  • (25)
  • (25)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
    ANDOR
  • (10,333)
  • (3,499)
  • (3,391)
  • (2,981)
  • (2,593)
  • (1,261)
  • (932)
  • (344)
  • (10)
  • View all 9 Services
    ANDOR
  • (503)
  • (432)
  • (382)
  • (301)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (50)
  • (50)
  • (49)
  • (48)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (23)
  • (23)
  • (23)
  • (22)
  • (21)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
18,926 case studies
Case Study missing? Just let us know via Add New Case Study.
18,926 Case Studies Selected
USD 0.00
Buy This List
Compare
Sort by:
Implementing an Economical, Ready-Made EHS Software Solution to Transform Program Performance and Mitigate Risks
The company, a publically traded, Asia-based automotive manufacturer with global manufacturing locations, was looking to manage EHS at a single, U.S.-based manufacturing site. They needed a holistic platform to address EHS compliance and management concerns that could easily be implemented with their ~1,000 employees. The company was particularly interested in built-in reporting features, something their previous system lacked. They were looking to digitize their compliance and management system, including moving away from paper-based employee concern reporting, transitioning from clipboard inspections to mobile inspections, and replacing their excel method for tracking safety and environmental compliance.
Download PDF
Contractor Management Implementing Behaviour-Based Safety to Identify Workplace Safety Risks
The company needed a system to track all employee safety and at-risk behaviors at retail and wholesale locations. They wanted to analyze Key Performance Indicators (KPIs) for trend analyses and multi-dimensional charting. The goal was to enhance the overall safety culture and drive safety improvements across site programs. They required a centralized system to enable behavior-based safety observations across retail and distribution locations. The system needed to record employee observations at respective site, department or equipment-specific levels, maintain real-time visibility to safety observations across multiple locations, and leverage Mobile technology to record observations.
Download PDF
Transitioning to a Globally Harmonized System of Classification and Labeling of Chemicals (GHS) for Hazard Communication Compliance
The pharmaceutical company needed to transition to a new chemical management system to meet the United Nations’ GHS standard. This involved changing over 8,000 chemical products and training employees on the new system. The company required a comprehensive HazCom and chemical management system with support services for content migration & maintenance, system implementation, and employee training. They also needed secondary container labels for additional chemical standard compliance. The company wanted easily accessible Safety Data Sheets (SDS) for over 8,000 chemical products, expanded GHS labeling capabilities, including adding Quick Response (QR) codes to labels, and mobile capabilities to streamline the chemical management process.
Download PDF
Framework Scorecard: Enabling a Global Company to Drive & Track Site Implementation of EHS Program Elements
The company launched an initiative to systematically implement EHS and Sustainability program elements to standardize key processes at all of their global sites. The challenge was to execute the initiative via a digital solution that enabled sites to adopt applicable program elements in a prioritized sequence with the concurrence of business program leaders, while providing continuous visibility to corporate management. The company needed to implement a phased priority scheme to manage EHS&S elements and set up a system that provided company-wide visibility to global sites. They also wanted to leverage data mining capabilities to easily identify risks across sites and drive corrective actions.
Download PDF
Accelerating Issue Resolution Using Quality Management System Software
The multinational company, a top mobility systems manufacturing and service company with a global footprint, needed a quality management software system to streamline the logging of nonconformities and other quality-related issues. They wanted to improve issue resolution by establishing an efficient process and increase visibility between field technicians and quality managers. They also required in-depth system training. The company needed an intuitive interface for enterprise-wide deployment, mobile capabilities for deployment within multiple facilities, and integrated data analytics & reporting for continuous improvement.
Download PDF
Implementing an Economical, Ready-Made EHS Software Solution to Transform Program Performance and Mitigate Risks
The company, a publicly traded, Asia-based automotive manufacturer with global manufacturing locations, was struggling with managing EHS at a single, U.S.-based manufacturing site. They were using outdated, inefficient methods such as paper-based employee concern reporting, clipboard inspections, and Excel for tracking safety and environmental compliance. The company needed a holistic platform to address EHS compliance and management concerns that could easily be implemented with their ~1,000 employees. They also required built-in reporting features, something their previous system lacked.
Download PDF
Training Compliance Successfully Integrating EHS After a Major Business Merger & Acquisition ( M&A)
The company faced the challenge of integrating EHS at over 300 global sites following a major M&A event. This required a cohesive strategy that included phased transition planning, stakeholder outreach and training, and systematic global implementation. The company needed global EHS/IT system training capabilities to reflect its footprint by region, time zones and languages to minimize costs and travel and meet local needs. They also needed an effective training and implementation plan to facilitate the adoption of a new EHS management system at integration sites, and site-specific support with in-person or Webinar-based training.
Download PDF
Aruba Increases Market Share and Improves Brand Perception with Uninterrupted Service Availability
Aruba, a leading web hosting, email, and domain name registration company in Italy, was facing a significant challenge with the rise of DDoS attacks. The evolution of cyber-attacks in recent years had changed the info-security threat landscape, and Aruba's existing defenses were no longer sufficient. The company needed a solution that could not only mitigate DDoS attacks but also guarantee service availability for its two million customers and subscribers. The ideal solution would react immediately, with no false positive events, in cases of attacks blocking millions of packets per seconds of malicious traffic. It would also need to fit within the existing network topology and provide a scalable approach according to capacity planning constraints.
Download PDF
Leading Mutual Fund Company Uses Radware’s Inflight™ to Protect and Grow Their Business
The customer is one of the world’s largest independent investment management organizations, with over 20 million online users generating peak usage of over 12,000 transactions per second (TPS). They needed to invest in online programs for the benefits they deliver, such as higher customer retention, stronger migration toward self-service channels, and more attractive and profitable demographics than the average off-line customer. Real-time event processing was challenging as many data points were fraught with latency and delayed processes. This was compounded when the business was dealing with hundreds of thousands of transactions per second, such as a brokerage firm or a bank. Real-time data feeds were therefore critical to their ability to efficiently manage their businesses for competitive advantage and growth.
Download PDF
Third-Largest European Bank Partners with Radware to Solve Encrypted Traffic-Processing Woes
The financial institution, being the third-largest bank in Europe, was facing a significant increase in encrypted traffic. This surge was slowing down the bank's network infrastructure and creating application latency. The bank's existing Web Application Firewalls (WAFs) lacked the capacity to decrypt, inspect, and re-encrypt large volumes of traffic. Moreover, the use of WAFs for encrypted traffic inspection often resulted in increased latency, negatively impacting application performance. The bank needed a solution that could handle high volumes of inbound encrypted traffic, work with global ciphers, adapt to new encryption technology, and have enough processing power to accept traffic, decrypt it, inspect it, and then re-encrypt it leveraging a low-level cypher.
Download PDF
equaTEK Interactive Response Time Cut Dramatically
equaTEK Interactive, a web solution development company, was developing a SaaS application with high performance requirements. The engineers were working hard to optimize the application's performance, but they were struggling to make significant improvements within the budgeted time. The company needed a solution that could enhance the application's performance without consuming too much time and resources.
Download PDF
BlackMesh Guarantees Uninterrupted Availability for Clients with Radware’s DDoS Protection as a Service
BlackMesh, a Virginia-based cloud hosting company, was facing an evolving threat landscape with only a reactive DDoS prevention solution in place. Despite implementing various tools and techniques to repel attacks such as access control lists, null routing, and cache filtering, the organization still experienced service degradation and downtime that lasted between 45-60 minutes during each cyber-attack. BlackMesh needed to shift to a more proactive stance when it came to protecting its datacenter which ultimately impacts clients and business operations. In order to ensure uninterrupted availability that could negatively affect SLAs, BlackMesh needed to implement the right solution in its datacenter.
Download PDF
TeraGo Uses Radware’s DDoS Attack Mitigation System to Power New Suite of Security Services
TeraGo Networks, a company that owns and manages a national IP network across 46 major markets in Canada, was in need of a market-leading DDoS detection and mitigation solution. This was to protect its own infrastructure and to offer its customers a new suite of security services across its telco, data center, and cloud hosting environments. The company had previously deployed remotely-triggered black hole (RTBH) filtering to protect its IT infrastructure against attacks. However, this method had its drawbacks as legitimate traffic could be blocked and TeraGo customers experienced slower response times. Moreover, a volumetric DDoS attack against either TeraGo or one of its own victims could have a trickle-down effect whereby multiple TeraGo customers could be impacted, resulting in dissatisfied customers and increased customer attrition. Lastly, RTBH filtering could not be commoditized, preventing TeraGo from launching a suite of DDoS mitigation services that hit at the heart of what customers were requesting.
Download PDF
Broadvoice Provides Disruption-Free Service to Customers with DefensePro
Broadvoice, a leading provider of telecommunications, faced several denial of service attacks and an increasing amount of background noise threats. As a VoIP service provider, Broadvoice ranks security and compliance as a top priority. The organization understands the level of disruption that a DDoS attack could cause on a telecommunications business and the importance of guaranteeing service to customers. After suffering several denial of service attacks, Broadvoice needed a solution to proactively defend against impending threats and attacks.
Download PDF
National Government Entity Maximizes Productivity and Protects Organizations’ Service Infrastructure with Radware Solutions
The national telecommunication company, which provides over 30 different web services to employees and customers, needed to improve load balancing and guarantee service availability. With a large number of web applications running and high daily network traffic, they needed more control of the application process and ensure continuity during all migration phases. The IT infrastructure of the company is constantly evolving every 18 months, requiring them to modify their solutions to adapt to the demands of their customers. They needed a solution that offered scalability and the opportunity to grow on demand.
Download PDF
Providing High Availability to Produban’s Customers
Produban, one of the largest banks in Mexico, was facing a significant challenge as their business expanded. They needed an on-demand solution for computing resources and processing power. They required a flexible application delivery solution to deploy their online banking business and provide load balancing capabilities in the data center. While cost was very important to Produban, the solution also needed to provide a quick install with minimal service disruption for its clients. Internet banking is one of Produban’s most important business channels, handling more than 1.5 million transactions per hour and 300K concurrent users. In order to eliminate these challenges and ensure application availability for their customers, Produban pursued solutions from some of the industry’s top security companies.
Download PDF
How Traveloka increased real-time bookings and stopped ATO attempts
Traveloka, a leading platform for booking flights and hotels in Southeast Asia, was facing two main types of abuse: payment fraud from stolen credit cards and account takeover (ATO) from stolen credentials and social engineering schemes. Both these problems led to financial loss and, more importantly, damaged user trust and brand reputation. Traveloka had an internal team dedicated to fraud and risk, developing a series of elaborate fraud rules that attempted to provide an automated first screening of all orders. However, as the range of customers on the site changed, Traveloka’s rules-based system couldn’t keep up. They experienced many false positives that were blocking good customers and their orders, leading to poor customer experience. On the ATO side, static rules were missing a lot of cases, weren’t able to adapt quickly enough to emerging trends, and resulted in a lot of false positives, blocking legitimate users from accessing the site.
Download PDF
Stopping fake listings from harming customer experiences
Travelmob, a social marketplace for travellers, was facing a growing trend of fake listings on its site. Bad users were posing as legitimate hosts, posting photos of properties they didn’t own, and trying to con unsuspecting guests into making their payment offsite. This was negatively impacting the customer experience and the company's brand image. Additionally, the company was also dealing with credit card fraud that was resulting in costly chargebacks. Initially, Travelmob began by manually reviewing new listings and booking requests, but this approach was not scalable and fraud was slipping through the cracks. Building dedicated internal tools for fighting fraud would require time and resources that they couldn’t spare, and anything they created internally couldn’t adequately address the complexity of fraud.
Download PDF
Serving international travelers and keeping fraud low
Logitravel, an online travel agency, was facing a significant challenge with fraud as they expanded into new markets. They were vulnerable to various types of fraud, including organized crime fraud rings, friendly fraud in contested ticket sales, and phishing and account takeover. Their existing third-party rules-based fraud solution was unable to keep up with their growing business and evolving markets. After a particularly destructive barrage of fraud, they realized they needed a more robust and scalable solution.
Download PDF
Safely sending millions of dollars overseas every month
Remitly, a company that enables customers to transfer money internationally, was facing a significant challenge with fraud. As the company expanded its services in the Philippines, fraud activity increased. The company's risk team, despite having several years of fraud investigator experience, was overwhelmed with the volume of data they had to review. They had set up 80-100 rules to capture suspicious activity, but scaling was proving to be a challenge. The system they were using was also incapable of learning from the company's data.
Download PDF
Streamlined fraud workflow, delightful user experience
Everything But the House (EBTH) was facing a challenge with fraudulent bids on their online estate sale platform. Fraudulent activities included users bidding with stolen credit card information or without any real intention to complete their purchase. This not only delayed profits for the sellers but also potentially lowered the selling price of the items when they had to be relisted. The continuous occurrence of fraud could lead to customers questioning the integrity of the site. EBTH was using a tool that sent identifiable information about bidders to its servers, but it was reactionary and didn't offer any proactive notifications. Therefore, the company started looking for solutions that could detect and prevent fraud proactively.
Download PDF
How Touch of Modern saves thousands by staying ahead of fraud rings
Touch of Modern, an online destination for curated designer products, was facing an increasing amount of fraud as the company grew. Initially, the company simply absorbed the cost of any chargebacks due to fraud, but this approach was not scalable. The company's customer service team had a very limited window to stop fraud, between processing an order and shipping it. They needed a solution that could accurately stop fraud without blocking legitimate users. The solution also needed to scale with their business, integrate with their internal systems, and automate decision-making to ensure quick processing and fulfillment times.
Download PDF
How Shippo balances positive experiences with unrivaled fraud protection
Shippo, a B2B shipping API provider, was facing a significant challenge with fraud. The company's business model, which allows users to create multiple shipping labels before having to pay, made it a target for fraudsters. The majority of the fraud fell into two categories: users who sign up with a fake email address and use a stolen credit card number, and users who create labels, hit the threshold, and then create a new account to avoid paying their invoices. In both cases, Shippo lost money – either from chargebacks from the accounts with stolen credit card numbers or lost revenue from the unpaid invoices. The company needed a solution that could preemptively identify account abuse and prevent users with stolen credentials from purchasing.
Download PDF
Improving manual review efficiency while reducing content fraud
KSL.com, a user-driven platform of both buyers and sellers, was suffering from an existential problem due to a growing percentage of fraudulent postings. Bad users were scamming legitimate users from all sides: publishing fake listings, taking over legitimate customer accounts, and running scams from hijacked accounts. Malicious users were also harassing the sellers of real listings, trying to scam them out of their goods and services. The main challenge Eric faced was not only finding and eliminating existing fraud, but also blocking bad users as they tried to re-access the site after one device or account was banned. KSL needed the ability to autoban bad users and repeat offenders. Fighting an imposing fraud rate of 75-80% in some of the more popular sections of the site, KSL’s sole fraud analyst wasn’t able to keep up with the demands placed on their internal fraud tools and manual review process.
Download PDF
How Zoosk keeps its community safe while improving user experience
Zoosk, a leading online dating company, was facing challenges with fraudulent users who were spoiling the experience for legitimate ones. The company was already working to reduce friendly fraud and payments fraud on the site. However, the real-time nature of Zoosk’s service and their ever-expanding user base meant that the company needed a solution that could adapt instantly and scale as their business grew. The existing tools and processes used by the dedicated team tasked with tackling fraud for Zoosk were not sufficient to meet these needs.
Download PDF
How a global domain registrar freed up time and beat fraud
iwantmyname, a global domain name registrar, was facing a significant challenge with fraud. The company was losing 2% of its revenue to fraudulent activities, which was unsustainable given the competitive nature of the industry. The process of detecting fraud was entirely manual, with two of the co-founders checking every single transaction for suspicious signals. This was not only time-consuming but also led to the company blocking all users from countries with high levels of fraud, negatively impacting their business. The company was missing out on revenue from legitimate customers in these countries and existing customers traveling in these countries faced extra hassle with their accounts. The team was spending as much as 30% of their time managing fraud, time that could have been better spent on growing the business and improving customer experience.
Download PDF
Building a trustworthy bitcoin marketplace
Purse, a San Francisco-based company, is working to create the world’s largest online marketplace using bitcoin. They offer the lowest prices and fast, frictionless commerce, processing millions in bitcoins every month. However, they faced a unique challenge with payment fraud. Since bitcoin transactions are final and irreversible, Purse had to detect and remove malicious actors attempting to game their bitcoin escrow system by purchasing items for Purse shoppers with fraudulent/hacked Amazon accounts. Initially, they combated fraud with internal tools, requiring three full-time support staff committed to fraud management and review. However, this was unscalable as the site grew.
Download PDF
How Patreon helps creators connect safely
Patreon’s work connecting fans with creators poses unique challenges, particularly around content, account, and payment fraud. Because their platform relies on the instantaneous transfer of funds – unlike in a traditional e-commerce model where a purchased good can be held while cardholder identity is verified – it is imperative to prevent payment fraud before it occurs. Payment fraud for Patreon comes in the form of either money laundering or traditional credit card fraud – and almost always, there are stolen credit card credentials at play. As their global reach grew, chargebacks and their resulting fees began to rise as well. In addition, manual review of listings and shared content was not keeping up with the rapidly expanding platform community. Patreon, a young and agile company with no fraud prevention measures in place, needed a content abuse and fraud solution that could scale with the business and would ensure the user experience remained seamless.
Download PDF
Enabling commerce and creativity with a single click
Creative Market, a San Francisco-based design marketplace, has a broad and continually expanding community. Their users vary from big corporate purchasers to independent freelancers, but they all shop through one-click checkout. This simple checkout means less friction, but it also opens the door to payment fraud. As the marketplace grew, payment fraud crept onto the platform. Although the teams originally built an internal rules-based fraud management system to combat the growing threat of fraudsters, their commitment to keeping the marketplace safe meant they wanted to get ahead of fraud and keep their chargeback rate low.
Download PDF
Creating a successful fraud solution from the ground up
Wanelo, a global marketplace for Gen Z, was facing a significant challenge with spammers and scammers. As the company evolved from a social shopping site to a marketplace, it started experiencing payments fraud. The fraud showed up in the form of disputes, with both friendly and scammy customers demanding 'charge not authorized' chargebacks. Nearly 70% of their chargebacks could be attributed to friendly fraud, which was a unique challenge to address because such customers often look like good and valuable users – until they decide that they don’t want to pay. Wanelo’s job then was to convince the bank that the customer is committing chargeback fraud. As more fraudsters attempted bad activity and Wanelo’s chargeback rate crept up to 0.87% – including friendly fraud – Courtney Bode, Marketplace Operations Manager, turned to the system that had worked so effectively for the social side of the company.
Download PDF
test test