Getting Started with RiskOS™

An introduction to RiskOS™ for new users and prospective customers. Learn what the platform does, how to choose between Enterprise and Socure Launch, and where to go next.

RiskOS™ helps you decide in real time whether to trust a user — by combining identity verification, fraud detection, compliance checks, and decision logic into a single platform. Instead of stitching together separate tools for each step, RiskOS™ brings them together so you can automate and manage risk across the entire customer lifecycle.

Here is what that looks like in practice: a new user signs up for your product. RiskOS™ evaluates their identity and fraud signals, applies your rules, and returns Accept, Reject, or Review — all in a single API call.

At a high level, RiskOS™ gives teams a way to:

  • Connect data, models, and policy logic
  • Evaluate events and customer actions in real time
  • Route cases, trigger workflows, and automate decisions
  • Balance fraud prevention, compliance, and customer experience

How it works

Every RiskOS™ decision follows the same chain: a workflow orchestrates the logic, enrichments provide risk signals, and an evaluation triggers the chain from your application.

flowchart LR
    A["Your app"] --> B["Evaluation API"] --> C["Workflow"] --> D["Enrichments"] --> E{"Decision"}

    E -->|Accept| F["Approve"]
    E -->|Reject| G["Deny"]
    E -->|Review| H["Manual review"]

Workflows

A workflow is a configurable sequence of steps that automates decision-making logic. Enterprise customers build and customize workflows visually using a drag-and-drop editor in the RiskOS™ Dashboard. Socure Launch customers use pre-built workflows optimized for their selected solution.

Each workflow defines:

  • Input — the data your application sends
  • Enrichments — external data services that add risk signals
  • Conditions — branching logic that routes the evaluation based on data values
  • Decision rules — the criteria that produce a final Accept, Reject, or Review outcome

Enterprise customers can also run Champion-Challenger experiments to test a new workflow strategy against a live workflow using the same production traffic — without affecting real decisions.

Enrichments

Workflows call enrichments to gather risk signals at each step. Each enrichment calls a specialized data service and returns structured results. RiskOS™ offers enrichments across several categories:

RiskOS™ also offers enrichments for risk scoring, authentication, and third-party providers such as Experian, Mastercard Ekata, and Middesk. See the Integration Guides for the full catalog.

Evaluations

An evaluation is what happens when your application triggers this chain. You send a POST request to the Evaluation API with user data and a workflow name. RiskOS™ runs the workflow, calls the configured enrichments, applies the decision rules, and returns a JSON response containing the decision, risk scores, reason codes, and all enrichment data.

📘

Synchronous vs. asynchronous workflows:

Some workflows complete all steps inline and return a decision immediately. Others pause for a user action — such as completing document verification or entering a one-time passcode — and deliver results via webhook when the action completes.


Solutions

Now that you understand the engine, a solution is how you put it to work. Each solution is a pre-built package designed for a specific business use case — customer onboarding, fraud prevention, compliance, authentication, and more. Solutions combine the right workflows, enrichments, decision rules, and configurations so you can launch without building from scratch.

RiskOS™ is available in two tiers. The right choice depends on where your organization is today and what you need from the platform.

  • Choose Enterprise when you need breadth, configurability, and scale
  • Choose Socure Launch when you want speed, a guided entry point, and fast time to value

Enterprise solutions are for organizations that need scale, flexibility, and deep customization.

These customers typically need to:

  • Support complex workflows across multiple products, channels, or regions
  • Integrate with multiple internal and third-party systems
  • Tailor decision logic to specific business rules and risk policies
  • Coordinate across fraud, compliance, operations, and engineering teams
  • Manage higher transaction volume and operational complexity
FeatureDetails
SolutionsMultiple solutions running concurrently
Workflow customizationFull drag-and-drop Workflow Editor with unlimited customization
Rate limitsHigher limits (configurable per contract)
Geographic coverageGlobal (180+ countries for select enrichments)
PricingCustom pricing — contact sales
OnboardingDedicated implementation support with go-live checklist
Advanced featuresChampion-Challenger experiments, Case Management with GenAI explainability, Analytics and Reports

Find the right path

The best starting point depends on what you are trying to solve and where you are in your journey.

If you are exploring RiskOS™ for the first time, start by identifying:

  • Your primary use case (onboarding, fraud, compliance, authentication)
  • Your current pain points and what you want to improve
  • Whether you need a packaged starting point or a customizable platform
  • Which teams will own implementation and operations

A few questions to guide your decision:

  • Are you trying to improve approval rates while controlling fraud?
  • Do you need to automate manual review processes?
  • Are you replacing legacy decisioning tools or point solutions?
  • Do you need support for compliance or identity workflows?
  • Do you expect to scale into more advanced orchestration over time?

If your needs are broad or highly specific, Enterprise is usually the better path. If you need to start quickly with a guided rollout, Socure Launch may be the better fit.


Integration approaches

RiskOS™ supports two integration paths. Your choice depends on how much control you need over the user experience and how quickly you want to launch.

RiskOS™ hosts the entire onboarding experience for you. You create an evaluation session, redirect the user to a Socure-hosted page, and receive results via webhook when the user completes the flow.

Time to launchFast — no front-end development required
CustomizationConfigure branding (logo, colors, fonts), field order, and flow steps through the Hosted Flow Builder
Best forTeams that want to launch quickly without building a custom UI

Channels for learning and guidance

📘

Additional resources: