Security Management System
Referral SaaSquatch's Security Management System protects you from unwanted referral activity through a wide range of advanced security algorithms.
What is our Security Management System?
The rewards offered as part of your referral program can be the target of unwanted or fraudulent activity. Our Security Management System automatically protects your referral program against suspicious activity. Our system actively monitors all incoming referrals and analyzes them against a range of criteria to check for potentially fraudulent activity. Along with this intelligent referral moderation, you have the ability to change a wide range of settings allowing you to customize how you want your referral program to work.
What does our Security Management System detect?
Our Security Management System employs advanced algorithms to check incoming referrals for:
- Similar Name
- Similar Email Address
- Same IP Address
- High Rate of Referrals
- Temporary Email Address Domains
How do I use it?
You referral program’s default referral moderation settings will check for fraudulent activity, and highlight that activity to you on the Security page in the portal, but take no direct action. You can then choose whether or not you would like to allow our advanced fraud management system to act on potentially fraudulent referrals.
For a simple and secure referral program select the option to have referrals that have been flagged as potentially fraudulent set to pending. This change is found on the General tab of the Program Security page’s Security Options.
More information about changes you can make to the Security Management System for your referral program, in-depth details about the mechanics of the process our fraud system goes through, the specifics of the criteria being checked, and how to build your own additional referral moderation functionality can be found in our developer documentation on our Security Management System.
To learn more about Referral Program Fraud Prevention, Detection, and Response take a look at our in-depth article on each of these security topics.