In the world of e-commerce, robust fraud prevention is not just a feature—it's the foundation of trust and sustainable growth. While every Peach Payments merchant is protected by a powerful, multi-layered security system by default, we understand that every business is unique. The risks faced by a high-volume ticket seller are different from those of a subscription service or a luxury goods retailer.

That’s why we go beyond one-size-fits-all solutions.

This guide introduces our suite of advanced, customisable risk checks, designed to give you the power to build a tailored security strategy that perfectly matches your business's unique risk profile.


Understanding the Framework: How Custom Risk Checks Work

Imagine being able to add specific security guards to watch over the areas of your business that are most vulnerable. That’s precisely what our advanced risk checks allow you to do. You can select from a comprehensive list of over 100 individual checks to create a fraud prevention setup that is as unique as your business.


The Transparent Pricing Model: Operational Points (OPs)

We believe in transparent and predictable pricing. Our custom risk checks are based on a simple system called Operational Points (OPs).

  • How it works: Every advanced risk check has an OP value assigned to it, representing its cost.
  • The cost: 1 Operational Point (OP) is equivalent to R0.02 (two cents).
  • How it's charged: This cost is applied to every transaction that is screened by your custom rule set, whether that transaction is ultimately successful or declined. The security check is performed in every case to ensure you are protected.

Here's a practical example:

Let's say, after consulting with our team, you decide to activate a set of powerful checks that total 15 OPs.

  • 15 OPs * R0.02/OP = R0.30

This means an additional R0.30 (30 cents) will be applied to each transaction, giving you a highly advanced and tailored layer of security that specifically targets the risks relevant to you. This model allows you to balance budget with an enhanced security posture perfectly.


Your Security Toolkit: A Tour of the Available Risk Checks

Our extensive catalogue of risk checks allows you to scrutinize every aspect of a transaction. Here are some of the most popular categories and examples of the checks you can deploy:

1. Velocity Checks: Monitoring Transaction Speed & Frequency

  • Benefit: The single most effective way to stop automated, high-speed fraud attacks and card testing.
  • Example Checks:
    • Limit the number of transactions per IP address in a given timeframe.
    • Limit the number of transactions per card number or device fingerprint.
    • Flag or block customers who attempt to use multiple different cards in a short period.

2. Geolocation & IP Plausibility Checks: Analysing "Where" a Transaction Comes From

  • Benefit: Block transactions from high-risk countries or identify attempts to hide a location.
  • Example Checks:
    • BIN Country Check: Does the card's issuing country match the customer's location?
    • High-Risk Country Block: Automatically block all transactions originating from specific countries known for high fraud rates.
    • Anonymous Proxy Detection: Identify if a user is trying to hide their true location using an anonymous proxy service.

3. Card & Payment Information Checks: Scrutinising the Payment Method Itself

  • Benefit: Look for red flags on the card itself to determine its legitimacy before processing.
  • Example Checks:
    • Prepaid Card Check: Identify and flag transactions made with prepaid cards, which can sometimes be higher risk.
    • Blacklist Checks: Screen the card number, email, or IP address against a global database of known fraudulent actors.
    • Card Issuer Verification: Check if the card is from a legitimate and recognised financial institution.

4. Customer Data & Plausibility Checks: Ensuring the Details Make Sense

  • Benefit: Catch fraudsters who are careless with details by ensuring the information provided is logical and consistent.
  • Example Checks:
    • Address Validation: Check if the shipping address and billing address are the same.
    • Email Validation: Check if the email address format is valid and if it's from a disposable email provider.
    • Semantic Validation: A logical check to see if a provided name or address appears to be nonsensical (e.g., "Test Test").


How to Build Your Custom Security Profile

You don't have to be a security expert to get started. Our dedicated team is here to guide you.

The best first step is to contact your Peach Payments Account Manager or our expert support team. They will help you analyse your specific business risks, review your transaction history for patterns, and recommend a cost-effective package of checks that will provide the best protection for you.

Don't settle for standard security. With Peach Payments' customisable risk checks, you have the power to build the precise, intelligent defence your business needs to thrive securely.