New account fraud prevention tools: An evaluation guide

Radar
Radar

Luttez contre la fraude grâce à la puissance du réseau Stripe.

En savoir plus 
  1. Introduction
  2. What are new account fraud prevention tools?
  3. How do new account fraud prevention tools work?
    1. Device intelligence
    2. Behavioral biometrics
    3. Network and velocity analysis
    4. Identity signal enrichment
    5. Real-time scoring
  4. What should you look for when evaluating new account fraud prevention tools?
    1. Signal quality and network breadth
    2. False positive rate and handling
    3. Transparency
    4. Step-up integration
    5. Reporting and feedback loops
  5. How do integration and deployment decisions affect your new account fraud prevention tool choice?
  6. How well do new account fraud prevention tools perform under real attack conditions?
    1. Adaptive adversary detection
    2. Headless browser and emulator coverage
    3. Throughput during a spike
    4. Operations support during an attack
    5. Reliability SLAs
  7. What security and privacy requirements should new account fraud prevention tools meet?
    1. Data minimization
    2. Geographic data residency
    3. Audit logs
    4. Vendor security posture
  8. How do you run a proof of value to compare new account fraud prevention tools?
    1. Catch rate on confirmed fraud
    2. False positive rate on legitimate sign-ups
    3. Conversion impact
  9. How Stripe Radar can help

A fraudulent account created today might sit dormant for weeks before it’s used to drain a referral program, cycle gift cards, or layer transactions through synthetic identities. By the time the pattern is visible, clean attribution is gone, and the damage is done. Businesses have estimated that 3% of their total ecommerce revenue is lost to fraud each year. New account fraud prevention tools are software systems designed to catch fake accounts at sign-up, and they vary in signal quality, adaptability, and how well they hold up against attacks.

Below, we’ll cover what these tools do, what separates good ones from adequate ones, and how to run a fair evaluation to compare new account fraud prevention tools.

Highlights

  • New account fraud prevention tools layer device intelligence, behavioral biometrics, and network signals to score each sign-up attempt before an account is created.

  • To evaluate these tools, look at false-positive handling, transparency, and the model’s performance against adaptive attackers.

  • A rigorous proof of value simultaneously runs both tools against the same traffic and measures catch rate, false positive rate, and conversion impact together.

What are new account fraud prevention tools?

New account fraud prevention tools are software systems that assess sign-up attempts in real time and return a risk signal before the account exists. These tools often sit between your registration flow and user database and evaluate each attempt against device data, behavioral signals, identity attributes, and network-level intelligence.

These tools aim to combat new account fraud, which happens when someone creates an account using fabricated, stolen, or synthetic identity data. Rather than take over an existing account, they exploit a business’s platform from Day 1. The fraudulent actor might claim welcome bonuses, bypass spending limits, launder money through layered accounts, or establish a foothold for future abuse.

How do new account fraud prevention tools work?

These tools layer multiple detection mechanisms to build a picture of each sign-up attempt. Here are the tactics they use:

Device intelligence

When a user lands on your registration page, a JavaScript snippet or mobile software development kit (SDK) fingerprints the device and captures browser version, screen resolution, installed fonts, and dozens of other attributes. The tool uses this information to generate a stable identifier. The goal is to recognize when the same physical device creates multiple accounts, even after the user clears cookies or switches browsers.

Behavioral biometrics

This captures how users interact with the form, including typing cadence, mouse movement patterns, how long they pause on each field, and whether they tab between inputs or click. Humans complete forms in unique, inconsistent ways.

Network and velocity analysis

This looks at Internet Protocol (IP) address, connection type, and whether signals cluster suspiciously. A thousand sign-ups from the same /24 subnet (a common network configuration) over 20 minutes is an obvious signal, but a more subtle tool correlates device fingerprints across customers, so it recognizes a device that created fraudulent accounts on three other platforms before it touches yours.

Identity signal enrichment

This cross-references submitted data—such as email address, phone number, and physical address—against databases of known fraud patterns. This mechanism checks data points such as the age of the email domain and whether the phone number has appeared in previous fraud rings.

Real-time scoring

These signals feed a model that returns a risk score, usually 0–100 or 0–1, before the account is written to your database. Your platform uses that score to approve, flag for review, or prompt step-up verification.

What should you look for when evaluating new account fraud prevention tools?

Many businesses provide new account fraud prevention tools. Here’s what separates good tools from adequate ones:

Signal quality and network breadth

A tool that sees only your traffic has a narrow view of the threat landscape. But ones that operate across many platforms accumulate consortium signals. They’ve seen a device or an email pattern before, even if you haven’t. Ask vendors how large their network is, what industries it covers, and whether consortium data is opt-in or automatic.

False positive rate and handling

Blocking a legitimate user at sign-up might be expensive because you lose that customer, and depending on your category, you might not get them back. Ask for false positive rates across different traffic types (e.g., mobile, international, virtual private network [VPN] users); you want more than aggregate numbers. Then ask how the tool handles edge cases, whether it’s possible to build exemption rules, or whether the model is a black box.

Transparency

When an account gets flagged, your team needs to understand why. “High risk score” is too generic. Effective tools show the key signals clearly so analysts can make informed decisions and your rules improve over time.

Step-up integration

Tools should integrate cleanly with your step-up verification stack, whether that’s a one-time passcode (OTP) flow, a document verification provider, or a manual review queue. Ask how that handoff works, who maintains it, and what happens when your step-up provider is down.

Reporting and feedback loops

If there’s no feedback mechanism that lets you mark confirmed fraud or false positives and have that influence the model, it will lose its calibration.

How do integration and deployment decisions affect your new account fraud prevention tool choice?

How you choose to integrate shapes your timeline, coverage, and ongoing maintenance more than almost any other factor. Tools might offer two paths: a client-side SDK, such as JavaScript for web and native libraries for iOS and Android, or a server-side application programming interface (API) call. Effective setups use both.

Here’s what to look for:

  • Latency: Ask for 95th to 99th percentile latency numbers. Make sure you’re not looking at averages because they might hide how long the slowest requests take. This ensures you capture the slowest real-world performance, not just the average.

  • Mobile coverage: If many of your sign-ups come through mobile apps, confirm that mobile SDKs are maintained, updated regularly, and consistent in signal quality with the web version.

  • Step-up thresholds: Determine who controls the logic that decides when to escalate to step-up verification. If it lives in the vendor’s platform, you’ve traded flexibility for convenience. But if you can define your own rules on top of the risk score, then you retain control.

  • Fallback behavior: If your risk scoring service is unavailable, you’ll need a backup plan. Your sign-up flow might fail open, so everyone gets through, or it might fail closed, so everyone gets blocked. What you choose depends on your risk tolerance, but you need to know your default and whether you can configure it.

How well do new account fraud prevention tools perform under real attack conditions?

Evaluating a fraud prevention tool during normal traffic is easy. It’s more difficult to know how it behaves when someone is trying to beat it.

Look for these features to keep yourself protected against dynamic attacks:

Adaptive adversary detection

Sophisticated fraud operations test your defenses before they launch a big attack. They might create a small number of accounts to probe your weak points and then, depending on what they find, adjust their tooling to switch device fingerprints, rotate proxies, or slow down completion to mimic human timing. Ask vendors how the model responds when attackers adapt and how quickly it recalibrates.

Headless browser and emulator coverage

Headless browsers and emulated mobile devices are standard in modern fraud toolkits. Ask vendors how their device intelligence handles these and whether detection rates hold up against tools such as Playwright, Puppeteer, or Android emulators.

Throughput during a spike

Ask whether the scoring service can keep up if your sign-up endpoint is hit with 50,000 requests in five minutes or whether latency will degrade to the point where you lose visibility.

Operations support during an attack

Some vendors offer a dedicated response team when you’re under attack, but others might not. Make sure you know which one you’re buying before you need it.

Reliability SLAs

A 99.9% uptime guarantee sounds strong until you realize that’s roughly 8.7 hours of downtime per year. A reliable service level agreement (SLA) will typically provide specifics on planned maintenance windows and historical incident frequency, as well as contractual commitments.

What security and privacy requirements should new account fraud prevention tools meet?

Fraud prevention tools process a lot of sensitive data, which creates a compliance surface. Here’s what you should look for to minimize compliance demands and overall risk:

Data minimization

The tool should collect what it needs and nothing more. Ask for a data dictionary that includes what attributes are collected, where they’re stored, and how long they’re kept. Retention periods can vary, and when you’re handling identity-adjacent data, shorter is better.

Geographic data residency

If you operate in the EU, you must know where data is processed and stored. Some vendors route all signals through US infrastructure, while others offer regional processing. This affects your General Data Protection Regulation (GDPR) compliance posture.

Audit logs

You need a complete record of every risk decision, including what signals were present, what score was returned, and what action was taken. This matters for internal investigations, regulatory inquiries, and model auditing.

Vendor security posture

System and Organization Controls (SOC) 2 Type II certification is a baseline, not a differentiator. Ask about penetration testing frequency, vulnerability disclosure policies, and how the vendor handles a security incident that involves customer data.

How do you run a proof of value to compare new account fraud prevention tools?

Before you invite vendors in, write down the fraud patterns you want to catch. Then, run parallel tests if possible. Run a shadow mode evaluation where both tools score the same traffic simultaneously so you have a direct comparison to analyze. Testing vendor A for 30 days and then vendor B for 30 days doesn’t compare the same fraud environment.

From there, look at these metrics:

Catch rate on confirmed fraud

This requires a labeled dataset or a retroactive review period. If you don’t have one, build it before the evaluation starts; otherwise, you’ll measure vendor confidence instead of vendor accuracy.

False positive rate on legitimate sign-ups

Measure this across traffic segments, not in aggregate. A tool that performs well overall might have a false positive rate for international mobile sign-ups, which matters a lot if that’s a growth market for you.

Conversion impact

Track what percentage of real users hit a step-up flow and how many drop off. Friction has costs, and a tool with a slightly lower catch rate but substantially better conversion might be the right decision, depending on your business.

Involve your operations team in this assessment process. That team will tell you things that a technical evaluation misses, such as whether the interface withstands pressure, the reasoning is clear enough to make fast decisions, or the feedback loop works in practice.

How Stripe Radar can help

Stripe Radar uses AI models to detect and prevent fraud, trained on data from Stripe’s global network. It continuously updates these models based on the latest fraud trends, protecting your business as fraud evolves.

Stripe also offers Radar for Fraud Teams, which allows users to add custom rules addressing fraud scenarios specific to their businesses and access advanced fraud insights.
Radar can help your business:

  • Prevent fraud losses: Stripe processes over $1 trillion in payments annually. This scale uniquely enables Radar to accurately detect and prevent fraud, saving you money.

  • Increase revenue: Radar’s AI models are trained on actual dispute data, customer information, browsing data, and more. This enables Radar to identify risky transactions and reduce false positives, boosting your revenue.

  • Save time: Radar is built into Stripe and requires zero lines of code to set up. You can also monitor your fraud performance, write rules, and more in a single platform, increasing efficiency.

Learn more about Stripe Radar, or get started today.

Le contenu de cet article est fourni à des fins informatives et pédagogiques uniquement. Il ne saurait constituer un conseil juridique ou fiscal. Stripe ne garantit pas l'exactitude, l'exhaustivité, la pertinence, ni l'actualité des informations contenues dans cet article. Nous vous conseillons de solliciter l'avis d'un avocat compétent ou d'un comptable agréé dans le ou les territoires concernés pour obtenir des conseils adaptés à votre situation.

Plus d'articles

  • Un problème est survenu. Veuillez réessayer ou contacter le service de support.

Envie de vous lancer ?

Créez un compte et commencez à accepter des paiements rapidement, sans avoir à signer de contrat ni à fournir vos coordonnées bancaires. N'hésitez pas à nous contacter pour discuter de solutions personnalisées pour votre entreprise.
Radar

Radar

Luttez contre la fraude grâce à la puissance du réseau Stripe.

Documentation Radar

Utilisez Stripe Radar pour protéger votre entreprise contre la fraude.
Proxying: stripe.com/fr/resources/more/new-account-fraud-prevention-tools