This is a security service to prevent fraudulent use of credit cards.
Detect fraudulent use of Credit Card Payment using payment information and machine learning!
AI fraud detection
An identity verification service provided by credit card brands to make online credit card payment more secure.
3-D Secure
It is a fraud detection service that has been installed on more than 10,000 sites.
Fraud Detail Service O-PLUX
It is a solution that detects file / directory tampering, malware, backdoor program intrusion, etc. in real time and recovers them instantly.
WebARGUS
機械学習モデルの取引判定により、 不正取引を減らすと同時に売り上げアップや運用コスト削減に貢献します。
不正対策ソリューション Forter(フォーター)
We provide system connection methods and services for making payments without leaving credit card information on the merchants 's site.
This function that allows payments to be made after having converted the credit card information entered by a user into a token (a separate string of characters).
Token functions
We provide a "Non-retention of credit card information" countermeasure service that needs to be dealt with by March 2018.
Non-retention of credit card information
This service allows customers to be informed of the URL of our payment screen in the form of e-mail, SMS, or QR code and request it.
Email Payment Link Service
This connection method bring up a payment screen provided by us to process payments. It can be installed quickly and easily.
Link type
A service for processing credit card payments by entering a “permanent token” into a tablet device rented out by us.
Tokenization service (MOTO)
The IVR Payment Service uses IVR (interactive voice system) to process credit card payments when an order by phone at a call center.
IVR Payment Service
This is a service where we keep the card information entered by the customer. We will reduce the security risk of EC merchants make continuous charges.
Credit Card Information Storage Service
We protect merchants from chargeback losses caused by fraudulent use of credit cards.
An "SSL server certificate" that is valid to avoid risks such as "eavesdropping", "tampering", and "spoofing".