Enrichments Overview
Understand how RiskOS™ enrichments add risk, identity, and compliance signals to evaluations and how results appear in the API response.
What are enrichments?
In RiskOS™, enrichments (also referred to as products) are data services that supplement your evaluation with additional risk, identity, and compliance signals, beyond the data provided in your initial request.
How enrichments work
During workflow execution, an Enrichment step calls a Socure product or partner API (for example, Phone Risk, Email Risk, or Watchlist) to retrieve additional data.
Each enrichment returns structured data such as scores, reason codes, attributes, and validation results.
Enrichments are executed based on your workflow configuration.
Where enrichments appear in the API
In the Evaluation API response, enrichment results are returned in the data_enrichments array.
Each entry represents a single enrichment (product) call and includes:
enrichment_name– Name of the enrichment/productenrichment_endpoint– API endpoint usedenrichment_provider– Socure or partner servicerequest– Payload sent to the enrichmentresponse– Full response returned by the enrichment
This allows you to trace exactly what was called and what data was returned.
How enrichments are used
Workflows use enrichment outputs as inputs into:
- Conditions
- Scorecards
- Decisioning logic
These signals contribute directly to the final evaluation outcome:
ACCEPTREJECTREVIEW
Available enrichments
The following enrichments are available in RiskOS™. Select an enrichment to view its usage scope, configuration options, and integration guide.
Identity verification and data
Verify identity attributes and retrieve enriched PII data.
| Enrichment | Description |
|---|---|
| Verify and Verify Plus | Global KYC and identity verification data |
| Prefill | Basic or Advanced Prefill for faster onboarding and enriched identity data |
| eCBSV | Electronic Consent Based SSN Verification through a direct connection to the SSA |
| Deceased Check | Identify and prevent use of deceased identities |
Document verification
Capture and verify government-issued identity documents.
| Enrichment | Description |
|---|---|
| Predictive DocV | Verify government-issued IDs, confirm user identity, and detect document fraud in real time |
Note: DocV is available as a native SDK for iOS, Android, React, and Web, or as a Socure-hosted Capture App.
Device and behavioral intelligence
Assess device risk and detect behavioral anomalies.
| Enrichment | Description |
|---|---|
| Digital Intelligence | Real-time device, behavioral, and entity profiling to detect fraud signals |
| Account Intelligence | Real-time bank account availability and ownership verification |
Note: Digital Intelligence is available as a native SDK for Android, iOS, React Native, and Web.
Fraud detection
Detect identity fraud, synthetic identities, and first-party fraud using machine learning models.
| Enrichment | Description |
|---|---|
| Sigma Identity Fraud | Risk scores and reason codes that detect stolen identities and maximize auto-approvals |
| Sigma Synthetic Fraud | Detect manipulated and fabricated synthetic identities |
| Sigma First-Party Fraud | Detect repeat bad actors, chargebacks, and payment abuse using consortium data signals |
Risk scoring
Score individual PII attributes for risk and identity correlation.
| Enrichment | Description |
|---|---|
| Address Risk | Validate deliverability, detect fraudulent addresses, and strengthen identity correlation globally |
| Email Risk | Risk prediction and identity correlation based on email intelligence |
| Phone Risk | Risk prediction and identity correlation based on phone intelligence, with optional SIM swap detection |
| Graph Intelligence | Fraud detection, strategy optimization, and risk modeling built on Socure's Network Identity Graph |
Screening and compliance
Screen identities against watchlists, sanctions, and adverse media databases.
| Enrichment | Description |
|---|---|
| Watchlist | Screen and continuously monitor individuals against global sanctions, PEP, and adverse media lists |
User verification
Verify that a user has access to the contact information they provide.
| Enrichment | Description |
|---|---|
| One-Time Passcode (OTP) | Confirm user access to a phone number or email via SMS, voice, or email verification codes |
| Caller ID Name (CNAM) | U.S.-based phone number identity verification and fraud detection |
Partner integrations
Connect third-party data providers into your fraud prevention and compliance workflows.
| Enrichment | Description |
|---|---|
| Partner Ecosystem | Third-party integrations from partners including Middesk, Mastercard Ekata, Experian, Thomson Reuters Clear, and others |
Related resources
- Integration Guides — End-to-end integration guides for each enrichment and solution
- Workflow steps — Configure Enrichment steps and other workflow building blocks
- Popular Solutions — Pre-built workflows that combine multiple enrichments for common use cases
Updated 6 days ago
