SOLUTIONS

Car Rental Network  

CAR RENTAL DISTRIBUTION ANALYSIS

Real Time Data Capture
Make accurate pricing decisions with most recent, on-demand pricing data.

Additional Attributes
Track wider, analyse deeper. Add “point of sale” pricing, ancillary pricing, B2B/corporate fares, discounted pricing and more to your existing attributes.

Channel Coverage
Monitor pricing across channels, Mobile Apps and Meta Sites, in order to get a complete and accurate market information at all times.

Market Dynamics
Get intelligence on your best and worst performing markets, availability across O&Ds, yield to departure dates, and ranking.

Price Disparity Alerts
Keep constant vigil on distribution channels for any rate disparities on your offerings for a particular market.

Niche Comparitive Alerts
Create market comparison reports based on specific criteria such as PAX and Cabin settings.

Competitive Position
Get a single snapshot of your win-meet-loss position for all your markets and exact variance in pricing.

Price Disparity Alerts
Keep constant vigil on distribution channels for any rate disparities on your offerings for a particular market.

Analyzers

In order to build up a behavioral profile eDNA uses Machine Learning to continuously monitor many risk attributes, or what we call 'fingerprints'. These include:

  • Unknown devices
  • High risk IP addresses
  • Suspicious login locations
  • Tor usage
  • Whitelist and blacklist countries
  • Velocity checking
  • Geo-location anomalies
  • Project Honey Pot
  • AlienVault Open Threat Exchange

Continuous RISK ANALYSIS

Using the the eDNA API real-time requests for each users credibility is made. Each request is given a real-time risk score based on our machine learning techniques which covers 250+ technical and behavioural attributes. The score -  is returned within 200 milliseconds – if the score returned is 1 the request being made is blacklisted. Where a score less than 1 is returned for the given request,  the requester can either be challenged or be fed bad data. Where a score of 0 is returned the request is considered not to be suspicious and will be able to access your website & applications as usual.  
 

Customized Security
              Workflows