Suspicious Origins: How a Bank Uses IP Intelligence to Manage Proxy-Driven Risk
Hear how a Spur customer manages proxy-driven risk in a real-world banking environment. The discussion focuses on practical lessons learned when working with anonymized traffic such as VPNs and residential proxies — including how teams evaluate signals, separate noise from actionable risk, and apply IP intelligence in ways that reduce risk without introducing unnecessary friction.
What’s covered
- How a bank security team evaluates anonymized traffic signals across authentication, transaction, and investigation workflows
- Common VPN and residential proxy patterns, and how teams distinguish benign from elevated-risk activity
- How IP intelligence is ingested, enriched, and surfaced to analysts in day-to-day operations
- Practical considerations for turning proxy detection into consistent, repeatable decisioning
- Lessons learned from implementing and refining proxy-driven risk controls over time
Why this is relevant
- See how peers handle anonymized traffic without relying solely on static IP reputation
- Learn how teams balance security outcomes with user experience when risk is elevated
- Understand how proxy and VPN signals appear in real analyst workflows
- Leave with practical ideas you can adapt to your own environment, regardless of tooling
See the Difference Between Raw Data & Real Intelligence
Start enriching IPs with Spur to reveal the residential proxies, VPNs, and bots hiding in plain sight.