Search company, investor...
TransUnion company logo


Founded Year




Date of IPO


Market Cap


Stock Price




About TransUnion

TransUnion (NYSE: TRU) is a global risk and information solutions provider to businesses and consumers. The company provides consumer reports, risk scores, analytical services and decisioning capabilities to businesses.

Headquarters Location

555 West Adams Street

Chicago, Illinois, 60661,

United States


Missing: TransUnion's Product Demo & Case Studies

Promote your product offering to tech buyers.

Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.

Missing: TransUnion's Product & Differentiators

Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).

Research containing TransUnion

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned TransUnion in 2 CB Insights research briefs, most recently on Mar 9, 2022.

Expert Collections containing TransUnion

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

TransUnion is included in 6 Expert Collections, including Digital Lending.


Digital Lending

1,603 items

This collection contains companies that provide alternative means for obtaining a loan for personal or business use and companies that provide software to lenders for the application, underwriting, funding or loan collection process.



2,323 items

Companies and startups in this collection enable consumers, businesses, and governments to pay each other - online and at the physical point-of-sale.


Conference Exhibitors

5,302 items



7,442 items

US-based companies



69 items



268 items

TransUnion Patents

TransUnion has filed 45 patents.

The 3 most popular patent topics include:

  • Credit
  • Credit scoring
  • Identity theft
patents chart

Application Date

Grant Date


Related Topics




Payment systems, Data management, Transaction processing, Credit, Loans


Application Date


Grant Date



Related Topics

Payment systems, Data management, Transaction processing, Credit, Loans



Latest TransUnion News

How do cybercriminals steal credit card information?

Aug 19, 2022

How do cybercriminals steal credit card information? Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked. Share this item with your network: By Published: 19 Feb 2021 Given the exponential growth of e-commerce and online transactions, cybersecurity has never been more critical . Hackers may attempt to invade our privacy in several ways, but one area they find particularly enticing is credit card information. Stolen credit cards can negatively impact not just your finances, but your personal identity and privacy as well. Effectively protecting them and the data connected to them is essential in the online world. In this article, we delve into how cybercriminals can steal your credit card information, highlight best practices that can keep you safe and explain what to do should your credit card become compromised. 6 common ways credit card information is stolen Hackers can steal credit and debit card information in a variety of ways , using both online and offline methods. 1. Phishing Can a website steal your credit card info? The short answer is yes. With phishing, hackers attempt to steal valuable information by impersonating a trusted source. Phishing schemes can come in several different forms , including phone calls, fake websites and sales emails. For example, someone pretending to be from your issuing bank or credit card company calls and says they need to verify your credit card activity with some personal information and starts off by asking for your credit card number. Alternatively, a phishing email posing as a retailer offering you a discount or free items could be trying to trick you into giving up account details. This article is part of How to prevent: The best way to prevent phishing scams -- whether via email, phone or text -- is to never give up any personal or credit card information unless you initiated the contact. Also, go directly to a retailer's website to conduct business to ensure you control all transactions. Hackers and thieves have several methods at their disposal to steal credit card information. 2. Malware and spyware Be careful what you download. Accidentally downloading malware or spyware can enable hackers to access information stored on your computer, including credit card information and other details. Malware may include a keylogger that records your keystrokes or browser history and then sends that information to a hacker. How to prevent: Avoid downloading attachments, unless they come from a trusted source, and be wary of the programs you download and install on any of your devices. Also, use antivirus software that catches malware before it infects your computer. 3. Skimming Credit card skimming is a popular offline method used by criminals to steal personal information, which can also lead to identity theft, at a point of sale. Card readers at ATMs, pumps at gas stations and other locations can be tampered with to add skimming devices. These phony readers collect and pass on payment information to thieves, who then clone the cards and use them as they see fit. How to prevent: Inspect outdoor credit card readers for signs they may have been tampered with before using them. RFID skimming uses radio frequency identification technology to wirelessly intercept RFID chip-based credit, debit and ID information directly from cards or even from smartphones and tablets. They use near-field communication-enabled devices to record unencrypted data from the card or a device's RFID chip to steal card details, such as numbers, expiration dates and card holder names. How to prevent: Make sure your financial institution has adequate safeguards in place, including encryption. Shoulder surfing is a form of skimming that doesn't involve specialized technology. A thief simply watches a user enter their code into an ATM or credit card information into a phone. This can be done nearby (over the shoulder) or far away, e.g., through binoculars. How to prevent: Shield keypads with paperwork, body or by cupping your hand. 4. Data breaches High-profile data breaches -- the ones we hear about -- have, unfortunately, become fairly common over the last few years. And with the amount of data stored online, it represents another avenue for hackers to steal credit card, financial and other kinds of personal information. According to Statista, the 1,473 data breaches in the U.S. in 2019 led to the exposure of nearly 165 million personal data records, a trend that showed no signs of slowing down in 2020 . How to prevent: One way to mitigate the possibility of becoming a victim of a data breach is to use a virtual credit card that enables you to check out at e-commerce stores without including your credit card information. If you become a victim, steps you should take include freezing your credit, placing a fraud alert on it and replacing the card affected by the breach. Also, obtain a copy of your credit report and be extra vigilant of suspicious credit card activity. 5. Public Wi-Fi networks Unsecured public Wi-Fi networks carry some danger if you enter sensitive information when connected to them. While airport or hotel Wi-Fi can be convenient, precautions should be taken to protect against losing credit card and other sensitive information. Furthermore, should "Free Public Wi-Fi" show up on your device, it may actually be a hacker on a nearby smartphone or laptop attempting to get unsuspecting users to sign on so they can steal your personal information. How to prevent: Don't conduct sensitive business while connected to public networks. If you need to access these networks, use a VPN. Otherwise, stick to trusted authenticated access points and Service Set Identifiers or use your wireless cellular data connection. Being aware of the methods they use to steal personal information -- credit card data, in particular, but also other details that can lead to, among other things, identify theft -- is the first step toward protecting yourself. 6. Your trash While it may seem old-fashioned, criminals can dig through your garbage to find credit card statements, account information and more that they can use to their advantage. How to prevent: Opt to receive credit card statements via email. If you do receive paper statements in any form, shred them after you've stopped using them. Best practices to protect credit card data Cybercriminals can choose from an assortment of methods to get your credit card. Here are some tips to prevent that from happening. 1. Monitor credit reports Credit monitoring and identity security services such as LifeLock keep you up to date on your credit card activity. They can also help get you ahead of any fraudulent activity faster than if you were manually checking your statements. 2. Monitor bank accounts and review credit card statements for suspicious activity Checking credit statements manually and monitoring Equifax, Experian or TransUnion for purchases you don't remember making can alert you to strange transactions and suspicious activity. 3. Set up alerts to notify you of any suspicious activity Alerts from your bank via text, push notifications and/or email can help you identify suspicious transactions soon after they have happened. 4. Use antivirus software and VPNs If you're connecting to any public networks, it's helpful to use a VPN to protect yourself from malware and hackers. Not to mention, antivirus software can protect you if you accidentally download harmful malware. 5. Check websites for a secure URL When visiting any website, but especially when conducting online transactions, ensure the URL includes https:// and is secure. 6. Don't save credit card information on websites It can be tempting to save your credit card information on Google or at e-commerce sites you frequent. However, you should consider avoiding this practice, as it potentially provides hackers with access to your personal information in the case of a data breach. 7. Use strong passwords and two-factor authentication Another way to avoid being the victim after a data breach is to use strong passwords that contain a mix of letters, numbers and symbols. Two-factor authentication can provide an added layer of security to protect you. Consider using it when offered. 8. Don't write down your credit card information anywhere Finally, avoid writing your credit card number, PIN, expiration data, etc., anywhere or posting pictures of your credit card number online. What to do if your credit card information is stolen? Following the best practices in this article will help keep your credit card information away from danger. Nothing is foolproof, however. So, you may need to take action if your information is stolen. Here's what you should do. 1. Contact your credit card issuer Calling your bank or credit card company is the first step you should take if you suspect your card has been stolen or compromised. This can prevent any further damage from occurring and help you avoid liability for fraudulent purchases. Your credit card issuer will cancel your card and issue a new one. 2. Update your passwords Between data breaches, malware and public Wi-Fi networks, hackers can use several online methods to steal your credit card and personal information. Updating your passwords on any websites you regularly visit can prevent them from gaining access to this data. 3. Review and dispute credit reports Even after you cancel your credit card, there may still be some transactions you're not aware of. Continue to monitor your credit statements so you can dispute suspicious transactions. Credit cards are a common target for cybercriminals, and that's not going to change anytime soon. Being aware of the methods they use to steal personal information -- credit card data, in particular, but also other details that can lead to, among other things, identify theft -- is the first step toward protecting yourself. Being aware of the methods they use to steal credit card data, in particular, but also other kinds of personal information that can lead to, among other things, identify theft, is the first step toward protecting yourself. Implement the best practices in this article to keep your credit information safe and take a more active role in preventing yourself from becoming a victim of fraud. Next Steps

TransUnion Frequently Asked Questions (FAQ)

  • When was TransUnion founded?

    TransUnion was founded in 1968.

  • Where is TransUnion's headquarters?

    TransUnion's headquarters is located at 555 West Adams Street, Chicago.

  • What is TransUnion's latest funding round?

    TransUnion's latest funding round is IPO.

  • Who are the investors of TransUnion?

    Investors of TransUnion include Advent International, GS Capital Partners and Madison Dearborn Partners.

  • Who are TransUnion's competitors?

    Competitors of TransUnion include Jewel Paymentech, Artificial Labs, Chisel AI, SEON Technologies, App Orchid, Carpe Data, Credit Kudos,, Squirro, Micruity and 59 more.

Compare TransUnion to Competitors

Amenity Analytics Logo
Amenity Analytics

Amenity Analytics cloud-based text analytics tools allow companies in any industry to systematically extract intelligence from any text in real time. Amenity Analytics focuses primarily on extracting intel from financial documents.

CLARA Analytics Logo
CLARA Analytics

CLARA Analytics builds easy-to-use, AI/machine-learning based products that can get claims teams in front of their workers’ compensation claims. The products unlock predictive insights from the claims data to provide key signals to the claims team to drive efficiencies and improve the claim outcomes.

EasySend Logo

EasySend offers a no-code customer experience platform for building and optimizing digital customer journeys. EasySend helps enterprises go digital by converting paper, PDFs, and manual processes into fully-branded customer journeys for any use case. With the platform, users can design, build and launch digital customer processes in days, and continually optimize with advanced analytics. The company serves banking, healthcare and insurance enterprises. It was founded in 2016 and is based in Tel Aviv. Israel.

Sentiance Logo

Sentiance is a data science and behavior change company that turns motion data, captured by smartphone sensors, into insights about individuals’ behavior and real-time context. The company's uses ethical AI to create positive impact and sustainability in mobility, wellbeing by driving behavior change for optimized experiences and outcomes. Sentiance empowers companies to create personalized services and products through intelligent contextualized recommendations.

Atidot Logo

Atidot is a cloud-based, SaaS platform tailored specifically to the needs of the life insurance industry, which uses AI, machine learning and predictive analytics to enable life insurers to make data-driven business decisions. The company was founded in 2016 and is based in Ramat Gan, Israel.

Powerlytics Logo

Powerlytics provides data products that are sourced from IRS tax returns, the Census Bureau, and other government agencies. The company's database provides detailed comparative metrics geared to the needs of many professionals including financial services professionals, consultants, auditors, tax professionals, CFOs, Boards of Directors and others.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.