Getting Started with RiskOS™
An introduction to RiskOS™ for new users and prospective customers. Learn what the platform does, how to choose between Enterprise and Socure Launch, and where to go next.
RiskOS™ helps you decide in real time whether to trust a user — by combining identity verification, fraud detection, compliance checks, and decision logic into a single platform. Instead of stitching together separate tools for each step, RiskOS™ brings them together so you can automate and manage risk across the entire customer lifecycle.
Here is what that looks like in practice: a new user signs up for your product. RiskOS™ evaluates their identity and fraud signals, applies your rules, and returns Accept, Reject, or Review — all in a single API call.
At a high level, RiskOS™ gives teams a way to:
- Connect data, models, and policy logic
- Evaluate events and customer actions in real time
- Route cases, trigger workflows, and automate decisions
- Balance fraud prevention, compliance, and customer experience
How it works
Every RiskOS™ decision follows the same chain: a workflow orchestrates the logic, enrichments provide risk signals, and an evaluation triggers the chain from your application.
flowchart LR
A["Your app"] --> B["Evaluation API"] --> C["Workflow"] --> D["Enrichments"] --> E{"Decision"}
E -->|Accept| F["Approve"]
E -->|Reject| G["Deny"]
E -->|Review| H["Manual review"]
Workflows
A workflow is a configurable sequence of steps that automates decision-making logic. Enterprise customers build and customize workflows visually using a drag-and-drop editor in the RiskOS™ Dashboard. Socure Launch customers use pre-built workflows optimized for their selected solution.
Each workflow defines:
- Input — the data your application sends
- Enrichments — external data services that add risk signals
- Conditions — branching logic that routes the evaluation based on data values
- Decision rules — the criteria that produce a final Accept, Reject, or Review outcome
Enterprise customers can also run Champion-Challenger experiments to test a new workflow strategy against a live workflow using the same production traffic — without affecting real decisions.
Enrichments
Workflows call enrichments to gather risk signals at each step. Each enrichment calls a specialized data service and returns structured results. RiskOS™ offers enrichments across several categories:
| Category | Examples |
|---|---|
| Identity and KYC | Verify Plus, Prefill, eCBSV |
| Fraud detection | Sigma Identity Fraud, Sigma Synthetic Fraud, Sigma First-Party Fraud |
| Document and biometric | Predictive DocV, Digital Intelligence |
| Compliance | Watchlist Screening and Monitoring, Deceased Check |
RiskOS™ also offers enrichments for risk scoring, authentication, and third-party providers such as Experian, Mastercard Ekata, and Middesk. See the Integration Guides for the full catalog.
Evaluations
An evaluation is what happens when your application triggers this chain. You send a POST request to the Evaluation API with user data and a workflow name. RiskOS™ runs the workflow, calls the configured enrichments, applies the decision rules, and returns a JSON response containing the decision, risk scores, reason codes, and all enrichment data.
Synchronous vs. asynchronous workflows:
Some workflows complete all steps inline and return a decision immediately. Others pause for a user action — such as completing document verification or entering a one-time passcode — and deliver results via webhook when the action completes.
Solutions
Now that you understand the engine, a solution is how you put it to work. Each solution is a pre-built package designed for a specific business use case — customer onboarding, fraud prevention, compliance, authentication, and more. Solutions combine the right workflows, enrichments, decision rules, and configurations so you can launch without building from scratch.
RiskOS™ is available in two tiers. The right choice depends on where your organization is today and what you need from the platform.
- Choose Enterprise when you need breadth, configurability, and scale
- Choose Socure Launch when you want speed, a guided entry point, and fast time to value
Enterprise solutions are for organizations that need scale, flexibility, and deep customization.
These customers typically need to:
- Support complex workflows across multiple products, channels, or regions
- Integrate with multiple internal and third-party systems
- Tailor decision logic to specific business rules and risk policies
- Coordinate across fraud, compliance, operations, and engineering teams
- Manage higher transaction volume and operational complexity
| Feature | Details |
|---|---|
| Solutions | Multiple solutions running concurrently |
| Workflow customization | Full drag-and-drop Workflow Editor with unlimited customization |
| Rate limits | Higher limits (configurable per contract) |
| Geographic coverage | Global (180+ countries for select enrichments) |
| Pricing | Custom pricing — contact sales |
| Onboarding | Dedicated implementation support with go-live checklist |
| Advanced features | Champion-Challenger experiments, Case Management with GenAI explainability, Analytics and Reports |
Find the right path
The best starting point depends on what you are trying to solve and where you are in your journey.
If you are exploring RiskOS™ for the first time, start by identifying:
- Your primary use case (onboarding, fraud, compliance, authentication)
- Your current pain points and what you want to improve
- Whether you need a packaged starting point or a customizable platform
- Which teams will own implementation and operations
A few questions to guide your decision:
- Are you trying to improve approval rates while controlling fraud?
- Do you need to automate manual review processes?
- Are you replacing legacy decisioning tools or point solutions?
- Do you need support for compliance or identity workflows?
- Do you expect to scale into more advanced orchestration over time?
If your needs are broad or highly specific, Enterprise is usually the better path. If you need to start quickly with a guided rollout, Socure Launch may be the better fit.
Integration approaches
RiskOS™ supports two integration paths. Your choice depends on how much control you need over the user experience and how quickly you want to launch.
RiskOS™ hosts the entire onboarding experience for you. You create an evaluation session, redirect the user to a Socure-hosted page, and receive results via webhook when the user completes the flow.
| Time to launch | Fast — no front-end development required |
| Customization | Configure branding (logo, colors, fonts), field order, and flow steps through the Hosted Flow Builder |
| Best for | Teams that want to launch quickly without building a custom UI |
Channels for learning and guidance
Additional resources:
- Integrating with RiskOS™ — end-to-end integration guide
- Go-live checklist — five-milestone checklist from setup through production launch
- Solutions for startups — Socure Launch offerings and FAQs
- API and SDK keys — manage your credentials in the Developer Workbench
- Platform status — monitor RiskOS™ availability and subscribe to incident updates
Updated about 17 hours ago
