We're excited to announce that Castle has completed SOC (Service Organization Controls) 2 Type 2 attestation, which marks a big milestone in our continuous work of safeguarding your privacy and providing a secure foundation in your quest to eliminate fraud.
Today, we're launching a revamped filter bar in the Explore view, in order to both provide a more intuitive search experience as well as supporting more advanced queries by allowing AND and OR operators.
With Castle APIs you’re able to send custom properties both in the user traits section and in the general event properties section. This can provide useful business context such as which role the user is, which plan they are on, which organization they belong to etc.
Today we've launched the ability to add custom columns, based on any event field, in any group tab in the Explore view. Depending on the column type, you can now add e.g. min/max/average for numbers and unique value count for strings and enums. In addition to that, you can also see the most recent + top 20 values of the field.
Back in Feburary, we launched the ability to see matching users for a given search in the Explore view, to quickly see how many and which users are involved in a certain data pattern.
Castle's is built to make fraud investigations quick and efficient by collecting all user activity data in the same place, as well as providing powerful ways of exploring it. Today we're taking one more step in this mission by extending the default data retention from 30 days to 90 days, for all plans.
About a month ago, we launched a dedicated bot score to help you combat the specific problem of automated access to your service. This new score was the first in a series of more specialized scores which allows you to target more specific fraud types.
Back in February, we launched the ability to track events to Castle directly from the client app (both mobile and web). This provides both a really quick and easy way to get started with Castle, as well as providing additional behavioral context when investigating fraudulent activity.
Today, we're releasing a new signal for indicating whether someone is trying to use aliased emails to create multiple accounts. Aliasing allows users to use variations of the same email address to sign up for multiple accounts with the same email: [email protected] and [email protected] would be two examples of email aliases that lead to the same inbox [email protected], in case the email provider supports tags. In the case of GMail, which also ignores the period character in the username part, users can use variations like [email protected], [email protected], [email protected]
A few months ago, we released the ability to see the matched users when performing an event search in the Explore view. Today, we're releasing an improvement that will allow you to sort by any column in this view. This is very useful to highlight users with the highest risk score, or users with the most number of devices.