1. Consumer

We want consumers to use the TAG platform in order to enjoy a seamless, productive and fulfilling ecommerce experience without delays, fears or compromised data.


2. Merchant

Ecommerce merchants need strong tools to combat online fraud. At the same time, merchants cannot allow fraud to affect the natural flow of their business. TAG provides merchants with the heavy armor needed to combat online fraud, yet keeps the process light enough to not take away resources needed to grow the business.


To combat fraud successfully it means legitimate consumers are not adversely affected, inconvenienced or turned back due to fraudulent activities of others. Negative databases, client profiles, client history, real time dynamic risk management, are all core functionalities of TAG providing winning results for any merchant in any industry.


3. Payment Gateway

Merchant activity control, know-your-client, know-your-transaction and numerous other requirements will become standard as the costs of online theft skyrocket. With increased accountability for online transactions imposed on payment gateways rather than consumers, merchants or credit card providers, payment gateways are required to be fully integrated in all merchant activities: monitoring, reviews, enforcement and/or sanctions.


TAG is geared to provide a proactive pre- and post-transaction layer, filtering the undesired transactions and providing detailed forensics data to prevent or resolve disputes more timely, precisely and at a lower cost.


TAG is compliant with the European Union’s implementation of Strong Authentication standards for any size payment gateway--but so are many others. The TAG difference is the seamless soup-to-nuts, deposit-to-fulfillment process which optimizes the benefits of “strong authentication” as a fully integrated closed loop, risk management and reporting system built on proprietary encryption technologies which are mirrored and redundant throughout our global data centers.


“On 31 January 2013, the European Central Bank (ECB) issued mandatory guidelines that require all payment gateways, issuing, joint issuing/acquiring, and acquiring institutions, who jointly form the group defined as payment service providers (PSPs), to adopt 'strong (customer) authentication' by 1 February 2015. These requirements are for remote (online, mobile and internet) credit card transactions including and extend to e-mandates, eWallets, stored value cards, and credit transfers. The ECB mandatory guidelines are applicable within the Single Euro Payment Area (SEPA), which includes the EU28 member states, plus Switzerland, Norway, Liechtenstein, Iceland and Monaco. Of particular note is that PSP's that do not implement strong authentication will be liable for credit card and other fraud on their networks, with the e-merchant released from liability.” (Press release from the European Central Bank, Jan. 31, 2013. http://en.wikipedia.org/wiki/Strong_authentication. May 22, 2014).

Products

Our proprietary software and risk management expertise take on a new and interactive approach to conventional online transaction management. Data quantifications applying unique algorithms allow for real-time tagging and green-lighting of legitimate transactions creating a seamless, conventional purchasing experience for the consumer.


We successfully remove a user’s inconvenience factor by reducing false-positives in legitimate transactions and remove time consuming and ineffective fraud checks without compromising the users’ safety and security.

Payment Systems

Global, regional and industry specific payment options, major credit cards, person-to-person and money transfers available for any age or size operator: plug-&-play and mobile ready!

Proactive Fraud Control

To effectively combat fraud, TAG combines the latest available technologies and services: negative database management, forensic review, geolocation, biometrics, etc. Combined, these technologies create the perfect mix of options for any merchant to combat fraud without affecting the natural flow of business.


TAG’s proprietary fraud technology also permits the use and integration of third-party solutions to tag and track individuals, transaction types, geolocations and any other numerous types of identifiers using time or date stamps, clusters and groupings all in one user-friendly screen with streamlined and real-time data.

Risk Management

Risk management commonly refers to the balancing of risk or exposure versus opportunity. The management of risk consists of complex algorithms and values assigned to various actions and outcomes. TAG’s proprietary risk management system is our flagship product since its core pertains to the automation of detection, analysis and resolution of complex risk management criteria.


The criteria segment evaluates thousands of possible outcomes using a proprietary variables hierarchy capable of creating a 3D image of any transaction, profile or scenario. As a differentiator to conventional platforms using 3 to 7 variants, TAG applies a minimum of 2,000 unique variables to each risk exposure (transaction), with information quantified within sub-millisecond and capable of evaluating risk levels of multiple millions of simultaneous transactions.

Dynamic Risk Balancing
“Real-time and seamless threat identification and quantification system with sub-millisecond cognizance”.


In a 1:2 environment, risk balancing is impossible as the set of variables are irrelevant to the outcome, it will always be either/or, but never to the N-degree.


With Dynamic Risk Balancing, TAG’s proprietary system acts like the sense of reason on top of the sense of observation.


Part A of the system registers each activity passing through our system and provides basic categorization and segmentation.


Criteria 001: “Person is possibly using a card without authorization”.


Part B the of Dynamic Risk Balancing tool then provides the logic and determines the degree a single or group of actions have and creates a virtual snapshot of the activity in question.


Criteria 002: “Person has used a card without authorization before”.


Action 001: “Do not transact. Contact Credit Card authority”.


We perceive, we process, we react is the theory adapted in this Dynamic Risk Tool as it automates problem quantification processes in real-time and in sub-millisecond action for any degree of complexities.


The result is a seamless identification and real-time threat recognition very much in the way we perceive a friend or foe circumstance, but automated with remarkable results and cost savings.

Management Information System

Due to TAG’s extensive reach into each core and embedded function related to transactions, users and profiles applied through TAG’s proprietary platform generate reports, statistics and charts designed to assist the management decision process with real-time data and user friendly interfaces.


The management information system (MIS) uses customizable reports, defined by industry, client size and departments. Aside from our numerous reporting templates, our versatile MIS is a one-page management dashboard depicting the real-time financial flow and risk activity by brand, payment system and timeline using graphs, charts and easily referenced user interfaces.

Leadership

Our leadership consists of a unique and multidisciplinary talent pool with highly experienced fraud prevention, online security and financial experts. These experts have a long-standing history dealing with the multiple facets related to online fraud and are very aware of the countless losses these types of criminal activities have caused.


It is our leaderships’ firm conviction that our innovative software platform and risk management criteria will create an unprecedented shield against current and future online fraud risks and other threats associated with it.

Contact

Please fill out the requested fields completely and we will contact you shortly.

For general information, please contact: [email protected]