NewHOVA now supports TikTok & Instagram messaging — Africa's first unified CPaaS + CCaaS + UCaaS platform.Explore
Fraud Defender

Stop telecom fraud before it happens.

HOVA Fraud Defender uses real-time network intelligence to detect and block SIM-swap fraud, toll fraud, grey-route abuse, and account takeover — before a single fraudulent message or call is sent.

₵180M+
Fraud prevented annually
< 50ms
Detection latency
99.7%
Fraud detection accuracy
0
False positive rate target
Features

Everything you need.

SIM-swap fraud detection

Real-time detection of SIM-swap events at the carrier level — block OTPs and transactions when a SIM change is detected.

Toll fraud prevention

Automatic detection of IRSF, PBX hacking, and traffic pumping — with hard spending caps and automatic kill-switches.

Grey route blocking

Identify and block messages routed through unmonitored grey routes that bypass compliance controls and inflate costs.

Account takeover signals

Detect suspicious login patterns, impossible travel, device changes, and velocity anomalies — before accounts are compromised.

Network-layer intelligence

HOVA's direct carrier connections provide real-time network signals unavailable to application-layer fraud tools.

Configurable risk rules

Set risk thresholds per channel, per country, and per use case. Define automatic block, challenge, or alert actions.

Fraud analytics dashboard

Live and historical fraud attempt visualisation — by type, geography, carrier, and monetary impact.

Adaptive ML models

Fraud patterns evolve. HOVA's models are retrained weekly with pan-African carrier data to stay ahead of new attack vectors.

Developer-first

Live in minutes.

Simple REST API with SDKs for Node.js, Python, PHP, Go, and Java. Production-ready in minutes.

Webhooks for delivery receipts
99.9% uptime SLA
Global sandbox for testing
Detailed API reference docs
Node.js · Check fraud risk before sending OTP
import { Hova } from '@hova/sdk';

const hova = new Hova({ apiKey: process.env.HOVA_API_KEY });

// Check fraud risk before sending an OTP
const risk = await hova.fraud.assess({
  phoneNumber: '+233244123456',
  checks: ['sim_swap', 'account_takeover', 'velocity'],
});

if (risk.score > 0.7) {
  // High risk — block or challenge
  return res.status(403).json({
    error: 'Verification blocked due to suspicious activity.',
    riskLevel: risk.level, // 'critical'
  });
}

// Low risk — proceed with OTP
await hova.verify.send({
  to: '+233244123456',
  channel: 'sms',
  brand: 'HOVA',
});
Use cases

Built for every industry.

Finance

Mobile banking protection

Detect SIM-swap and account takeover before approving transfers or OTP-authenticated transactions.

eCommerce

eCommerce fraud prevention

Block fraudulent account creation, promo abuse, and payment fraud via phone number risk scoring.

Telecoms

Telecoms revenue assurance

Protect your SMS routes and voice termination from grey-route bypass and IRSF toll fraud attacks.

Insurance

Insurance claims

Detect phone fraud rings filing duplicate or synthetic claims — scored at first-notice-of-loss.

Transport

Ride-hailing safety

Flag driver or rider accounts showing suspicious device changes or location anomalies in real time.

Government

Government services

Protect digital government services from identity fraud and synthetic identity attacks.

Stop fraud before it costs you

Sub-50ms detection. No false positives. Pay per assessment.

Get started free