Frame 1000008974@2x
INTRODUCING SIGMA V5

Built to stay ahead in the AI era

Upgrade your fraud and identity decisioning with next-generation AI. Detect emerging fraud earlier, reduce false positives, and continuously improve performance—without rebuilding your stack.

The next frontier in fraud prevention

Sigma V5 is powered by proprietary, fraud-focused transformer architectures that were purpose-built for fraud prevention. Replacing the industry’s standard tree-based models, this patent-pending model evaluates every signal in context, learning from billions of identity records and surfacing fraud patterns that previous architectures were fundamentally incapable of seeing.

The numbers don’t lie

Sigma V5 is the most accurate model yet, empowering you to prevent fraud attempts while maximizing growth.

Frame 1000009015 (2)
A major bank upgrading from V4 to V5 saw third-party fraud capture jump 19 percentage points at 3% risk depth unlocking $48 million in annually-acquired customer revenue thanks to fraud loss reduction and increased approvals.
Frame 1000009015 (3)
A payments fintech hit 96% AUC while cutting secondary verification step-ups in half. Stronger growth engine, better user experience.
Frame 1000009015 (4)
A loan and financial services provider now catches 78% of the most carefully-constructed synthetic identities with a 7-point improvement, driven by new anomaly detectors and graph-powered transformer models.

This early performance data highlights the greater outcomes that can be achieved with V5. Here’s what drives them.

Tree-based models hit a wall

Traditional, tree-based models (like XGBoost and GBM) have been the industry standard for years, and for good reason. They work when fraud patterns are stable, data is abundant, and attackers play by known rules.

But none of those conditions hold true anymore.

These older models evaluate signals one step at a time through fixed decision paths. They can’t adapt when fraud is dynamic. They struggle in low-signal environments, and skilled fraudsters have learned to deliberately exploit their assumptions and inject just enough noise to slip through the cracks without triggering thresholds.

The result is a growing detection gap that no amount of feature engineering can close. The architecture itself has a ceiling.

Tree-Based Models (XGBoost / GBM)

Sigma V5: Transformer Architectures

cross-red

Sequential feature evaluation, one signal at a time

check-green

All signals evaluated simultaneously via self-attention

cross-red

Rigid decision boundaries that are gameable by adversaries

check-green

Continuous identity representations that are context-aware

cross-red

No learning from unlabeled data

check-green

Pre-training on labeled and unlabeled data

cross-red

Brittle on thin files or sparse data

check-green

Robust in low-signal environments via learned representations

cross-red

Each model trained from scratch

check-green

Transfer learning enables rapid adaptation

cross-red

Manual feature engineering required

check-green

Automatic feature discovery via embedding space

The Socure advantage

Transformer architectures are powerful. What makes Sigma V5 uniquely Socure is what feeds it.

Fraud rings don’t hide from the graph

At the core of V5 is Socure’s Identity Graph, one of the most comprehensive in the industry.

The graph doesn’t just provide features; it exposes the organized relational webs that are inherent to fraud and invisible in legitimate behavior. Coordinated fraud rings, shared device clusters, application velocity patterns; these signals don’t appear in individual records. They emerge from the graph. V5 is built to exploit that, allowing you to more confidently separate legitimate users from fraudsters and apply friction only where it’s needed.

The synthetic identity tell

Fraudsters randomize synthetic identities, but they can’t randomize everything. Even when SSNs appear unique, there are hidden statistical patterns such as tendencies to reuse or cycle through specific prefixes that expose fabricated identities under scrutiny. V5’s new synthetic anomaly detectors go beyond the traditional three-identifier check of name, DOB, and SSN to surface exactly these kinds of tells, catching the most carefully constructed synthetic identities that previous models missed.

Real-time breach intelligence

When a data breach occurs, risk doesn’t spread evenly; it concentrates. V5 doesn’t just flag whether an identity appeared in a breach; it measures how heavily that breach is driving application traffic in real time. This lets Socure quantify who is most vulnerable in the moment and apply friction selectively, rather than casting a wide net that degrades experience for legitimate users.

New labeling methodologies

Garbage in, garbage out. V5 attacks the problem at the source. By combining transformer embeddings, which surface hidden patterns strongly correlated with fraud, with credit header fraud alerts that document what actually happened to real victims, Socure has built a new labeling methodology that produces higher-quality training data. Better data means more precise detection, not just more powerful architecture.

Architecture that is built to learn, and built to last

V5 isn’t just a new model. It’s the foundation of a new engine.

Icons New

Autonomous model improvement

Agents continuously curate training datasets, discover new features, and retrain and validate models so performance is persistent, and never degrades between release cycles.

Icons New

Continuous feedback loop

Attacks are identified, context is surfaced, defenses are updated. Not quarterly. Continuously. The system improves in real time, every time fraud evolves.

Icons New

Always-on innovation

Upgrading shouldn’t require a months-long engineering project. V5 is architected for seamless migration and rapid adoption, so your team spends time acting on better intelligence, rather than just integrating it.

Icons New

Unified ecosystem

V5 is the first expression of Socure’s connected architecture, where every signal, every system, and every customer’s data contributes to a shared, always-improving defense.

A unified, holistic fraud solution

Sigma V5 doesn’t operate in isolation. It’s the intelligence layer at the center of RiskOS®, Socure’s unified operating environment for fraud and identity risk.

Let us prove it.

See how Sigma V5 can help you detect fraud earlier, improve approvals, and continuously strengthen your risk decisions. Speak with a Socure expert to learn more.