Demo Authentication & Login
1 / 10
01

Authentication & Login

Secure access with multi-factor authentication. The console requires email, password, and a TOTP token to verify analyst identity before granting access.

Email + PasswordMFA / TOTP TokenSession Management
Authentication & Login
02

Queries — User & Device Analysis

Search and analyze user or device behavior. View connection history, detect device fingerprints, and identify cross-device patterns.

Connection HistoryUsed DevicesOS & Browser ChartsDevice Fingerprinting
Queries — User & Device Analysis
03

Logs — Logins

Review authentication activity with detailed login records. Apply date filters, search by user, and inspect columns including IP, country, and alert status.

Date Range FilterColumn CustomizationDetail ViewExport Data
Logs — Logins
04

Logs — Transactions

Monitor financial operations in real time. Filter by date, amount, status, and risk score. Drill into individual transactions for full context.

Transaction FiltersRisk ScoreAmount & CurrencyStatus Tracking
Logs — Transactions
05

Logs — Events

Track system-wide events and behavioral signals. Events capture device changes, suspicious patterns, and automated rule triggers.

Event TimelineBehavioral SignalsRule TriggersAnomaly Flags
Logs — Events
06

Case Review

Investigate flagged sessions with a comprehensive case management interface. Review risk scores, device data, and make disposition decisions.

Case QueueRisk AssessmentAnalyst NotesDisposition Actions
Case Review
07

Agentic AI

Autonomous AI agents that monitor, analyze, and respond to threats in real time. Configure agent behavior and review autonomous decisions.

6 AI CoresAutonomous DecisionsThreat ResponseAgent Configuration
Agentic AI
08

Dashboards

Visual analytics across all fraud detection dimensions. Real-time charts, geographic heat maps, and KPI summaries for executive reporting.

Geographic MapsTrend AnalysisKPI CardsCustom Filters
Dashboards
09

List Management

Manage whitelists, blacklists, and watchlists for users, devices, and IPs. Bulk import, search, and configure automatic list-based rule actions.

WhitelistsBlacklistsWatchlistsBulk Import
List Management
10

Rules Management

Configure detection rules with a visual rule builder. Create simple or compound rules, set thresholds, and define automated response actions.

Rule BuilderCompound RulesAlert ConfigurationThreshold Settings
Rules Management