Mobile Money Services - Telecoms Risk Management
|
|
- Jayson Patterson
- 8 years ago
- Views:
Transcription
1 Mobile Money Services - Telecoms Risk Management A Præsidium Business Consultancy White Paper February 2012
2 A Præsidium Business Consultancy White Paper 2 Table of Contents Introduction 3 Background 4 What will be offered and who owns the risk? 5 Will the area of risk change? 6 Types of Fraud & Security Attacks & CSP Requirements 7 Considerations for a Successful Risk Management Strategy 8 Summary 9
3 Introduction With the advancements in technology relating to a broad range of financial services that will eventually encompass a global demographic, this will provide an untapped resource for Communication Service Providers (CSPs). A recent survey highlighted there are more than 3 billion mobile phones against 1 billion bank accounts globally. This position therefore presents a tremendous opportunity for CSPs to incorporate Mobile Money (MM) services into their product portfolio ranging from; M-Commerce, M-Payments, M-Remittances and M-Banking. So what will be the implications for effective risk management to meet the challenges for delivering secure and revenue protected MM Services? Some of the answers to these questions will depend on; how the services are offered, the demographics of the target market and the risk appetite of the individual CSPs and their Partners. The types of risks and what will ultimately be required to respond to these new business challenges must be vigorously examined before product launch to understand the potential levels of exposure.
4 A Præsidium Business Consultancy White Paper 4 Background Mobile payments generally involve three key elements; mobile devices, a merchant and the financial sector provider or trusted third party (TTP). The TTP is normally an established entity accepted by all parties to a contractual agreement, deal, or transaction. The TTP, in most instances, has responsibility for authenticating and authorising users in order to secure a payment transaction. They will act as the intermediary for the settlement of payments and any issues arising once a transaction has been processed. For CSPs, MM is being seen as one of the solutions for offsetting the decline witnessed in the more traditional voice revenues. Organisations such as the TM Forum have stated that CSPs are looking to get more from high margin information and services, so M- payments are now very much on the agenda. Mobile payments already encompass a number of categories, including mobile bill payment, mobile point of sale, m-commerce and mobile contactless such as Near Field Communications (NFC). In a number of countries, especially Africa where the adoption of MM is already a lucrative alternative for increasing revenues, the customer has truly embraced the experience of using banking services. There have been a host of new entrants into this financial space looking to challenge the market position of the established players like PayPal and Google, as they realise the real potential for increased services and revenues and how they need to work with the telecommunication industry. There will be further increased competition as CSPs, web players and the financial sector battle for pole position in the mobile payments revenue chain. The consumer will be continuing to seek out these facilitators for providing feature rich services and will expect fraud and security resilience to be in place to protect them. There will also be the criminal element who will be seeking out the service vulnerabilities to exploit them for their own financial gain, whether this relates to physical device to device transactions or SMS transfer of funds. Personal and financial information will be targeted. In a number of countries, especially Africa where the adoption of MM is already a lucrative alternative for increasing revenues, the customer has truly embraced the experience of using banking services The criminal fraternity are innovative and forward thinking when deploying their attacks on MM services. Experience has already clearly demonstrated some high profile fraud and security breaches. The most talked about being that of SIM Swap fraud which has engulfed certain countries and resulted in extremely negative public relations. Consumers will not consider or care about the fraudster s methods, all consumers will remember is that it was the CSP s SIM card that facilitated the fraud to extract their funds. Fraudsters simply assessed the level of exposure to fraud and exploited the features by remaining focused in obtaining exactly what they wanted control over the bank account with the method for achieving this being the SIM card. CSPs must learn from these experiences and not become complacent or forget that these are highly organised fraudsters. They operate their own businesses with their business model spanning all types of technology and crossing international boundaries. They inherently rely on the CSP s inability to respond and recover to fraud and security breaches in a timely manner.
5 A Præsidium Business Consultancy White Paper 5 What will be offered and who owns the risk? The breadth of services available will vary, but the most commonly recognised areas will include: mobile payments, mobile commerce and mobile remittances and mobile banking. The range of activities can be further broken down to include basic bank account management conducted via information alerts to performing payment transactions and purchases via devices. The aspects of mobile payments can relate to specific goods or services from different points of sale, to performing remote payments via person to person transfer, with the mobile banking element in essence acting as the wallet. The latter will involve activities being conducted in-country and may extend across international boundaries where the applicable rules and laws relating to anti money laundering (AML) will need to be applied by the CSP. The controls of Know Your Customer (KYC) will also be relevant in this environment and make the necessity for true customer identity even more essential. Vendors, retailers, merchants, content providers, CSPs and banks are all actively establishing new services and schemes and for each aspect there will be a requirement to consider the risk and who has responsibility for protecting their specific part. The introduction of these new players will mean ownership and accountability for risk will need to be determined at each point in the service delivery mechanism. For example, if SMS is used as the delivery channel, SMS traffic will increase so the CSP s fraud team will need to fully understand SMS and be in a position to monitor user s profiles for signs of abuse. If USSD is used as the delivery mechanism, then sufficient protection will need to be developed around the platform and associated processes. Each area of technology and the associated processes must be assessed to carry the MM service, with risk protection considered from an end-to-end perspective. The aspects of mobile payments can relate to specific goods or services from different points of sale, to performing remote payments via person to person transfer, with the mobile banking element in essence acting as the wallet. NFC is emerging as a major enabler for items such as electronic money, ticketing, document transfer, configuration of terminals in different locations and even tracking movement. The technology is compatible with existing contactless payment terminals already installed at retail outlets worldwide and therefore is a very attractive proposition for CSPs. It will also attract the criminal element as it is open to social & technical security and fraud risks. There are situations now where chip-based passports are being targeted and attacked by criminal groups to steal identities. The software to do this is available on the web using the same radio frequency identification (RFID) technology as NFC.
6 Will the area of risk change? There will always be risks associated with providing MM services but there will be varying and different levels of risk. Questions will be asked over ownership and accountability of the risk. Should it be a concern for the mobile customer or will the merchant take responsibility? In addition, the consumer will need to be increasingly aware of the risks associated to using a mobile phone for payments, realising that now the real value of the phone increases as it uses these enriched services and becomes a more valuable commodity to fraudsters and hackers. Where consumers utilise the proposed full range of MM services, then in essence the mobile will replace the traditional wallet or purse and will need to be protected accordingly. Consumers will need to keep track of exactly where their phone is at all times and allow caution when visiting websites using the phone s browser, clicking on links, or responding to text messages. There must be trust and integrity of all transactions. MM solutions will encompass a range of devices and end to end services involving multiple entities who in some instances will be partnering for the first time. This will present some of the traditional risks facing Telcos as well as introducing new ones and will result in even more formation of strategic partnerships, and therefore, from a risk perspective, increased reliance on these third party providers. CSPs must consider the implications and requirements to enable them to minimize their exposure to fraud and security risks and for actually assuring their revenues associated to devices, applications, processes and different business models....the consumer will need to be increasingly aware of the risks associated to using a mobile phone for payments, realising that now the real value of the phone increases as it uses these enriched services and becomes a more valuable commodity to fraudsters and hackers. Essentially, when considering risks, this will mean different things to different parties depending on where they are within the service delivery chain. CSPs need to consider the existing fraud threats that can manifest themselves in the MM arena, for example, subscription fraud, revenue share fraud, account credits and adjustments. This means evaluating their existing fraud type exposure to determine which areas will be impacted and either increase, reduce or result in new fraud risks. For the Revenue Assurance (RA) professional, they will need to consider the new data sources, credit balance mismatching, failed/missing transactions, refund settlements, revenue share model and dispute management. Financial institutions have a relatively strong track record relating to effective security management, however, their knowledge and understanding of Telecoms systems and associated risk management is still in its infancy. Co-operation and education will be a fundamental requirement when considering both the security and fraud management coverage of a CSP s MM products and services portfolio. Developing coherent and effective revenue protection strategies will be essential.
7 A Præsidium Business Consultancy White Paper 7 Types of Fraud & Security Attacks & CSP Requirements So what can we expect to see? What type of attacks have already happened or are likely to manifest themselves as consumer uptake grows? Some of the risks will be evolutions of existing risk types, so applying old techniques to new products and services in the MM market. These will include risks related to: Fraudulent Customer Application applicant falsifies identity to obtain a credit card Account takeover - criminal gathers pertinent documents to take over an account Trojans & Viruses applications downloaded by SMS or via App stores used to steal information or run programs to defraud customers Lost and Stolen illegal use of a credit card Skimming data stored in a mobile is copied to another mobile Spoofing - cloning of sites or webpages from which orders can be placed False merchant sites - designed to get people to hand over their credit card details Snooping - Intercepting unencrypted or encrypted data (access to Key/PIN) Phishing illegal interception of personal details e.g. credit card numbers Cloning copying of electronic customer information on to another device or terminal Billboard Phishing - unique threat to NFC to capture data MiM (Man In The Middle) capturing data over the air during transfer Pretexting - Social engineering to perform an unauthorised transaction Internal Fraud Persistent risk among operators/financial institutions Partner Fraud additional third parties leading to potential risk When the value of the services offered in the lucrative MM market increases, it is certain that the level and amount of concerted attacks by criminal groups will increase. The fraudsters will gravitate to these offerings due to the anonymity and geographical freedom they can offer.
8 A Præsidium Business Consultancy White Paper 8 Considerations for a Successful Risk Management Strategy What defences can be defined? A through and logical review of what and how the MM service is put to market will be critical to its success. Just one or two well publicised breaches in security will cause significant damage to the adoption of the service. From a control perspective, there are several key areas that must be considered by CSPs before launching services. Service Offering & Management Customer Identification and Registration Processes Financial Deposits & Transaction Management Data Storage & Usability for Fraud Management Customer Terms & Conditions and Liabilities Potential Fraud Controls - prevention, monitoring, investigation, reporting, KPIs Product Design & Technology Integrator Initiatives controls, visibility of activities Technical Controls control validations Third party Interfaces Product Management pilot phase through to full delivery Security Considerations authentication certification (standards & testing) Customer Monitoring Internal Fraud Persistent risk among operators/financial institutions Partner Fraud additional third parties leading to potential risk
9 A Præsidium Business Consultancy White Paper 9 Summary While the opportunities for MM services are great, providing a new lucrative potential revenue stream for CSPs, the risks can be even greater. It s no longer just the cost of carrying a call, but real money. The battle against fraudsters will never be won due to the fast moving telecoms environment and the drive to launch more complex products and services quickly to attract market share and maintain that competitive edge. With effective risk management, strong mitigation can be put in place. Evaluating the effectiveness of planned controls & initiatives ranging from technical, people and process related perspectives is an essential starting block to launch the service. Praesidium is able to offer expert support by combining it s deep telecoms security expertise with a solid understanding of risk management and experience in MM for new technology, products and services offered by CSPs. It can provide the depth of knowledge to review the Mobile Money Service in place or being proposed from a risk and security perspective. This includes assessing the proposed solution s architectural design for technical controls and the secure delivery mechanisms of the service and interface to the bearers (e.g. IVR, SMS, WAP, Data, Internet, NFC, etc) used to convey the transaction. Evaluating the effectiveness of planned controls & initiatives ranging from technical, people and process related perspectives is an essential starting block to launch the service. Determining the required controls for securing the service points of measurement, reconciliation and reporting are the essential elements to maintain and grow a profitable MM service. Effective risk management relating to the envisaged changes and introduction of new risks can be a time consuming and overwhelming activity especially for those CSPs who are not yet mature, or do not have MM expertise in the development of fraud and security control and prevention strategies related to these services. Præsidium is able to support CSPs in this space, having served over 100 clientes worldwide to review, advise upon and implement fraud and security strategies, train risk management personnel, or deliver and optimise risk management solutions.
10 A Præsidium Business Consultancy White Paper 10 About Præsidium About WeDo Technologies Præsidium is a Global Business Assurance consultancy. Founded in 1997, the company has successfully provided risk management consultancy to more than 100 Communication Service Providers in over 80 countries on 6 continents. Præsidium has gained solid recognition in the market amongst its substantial customer base and among global standards agencies. These include the GSMA Security Group & Fraud Forum, the Telemanagement Forum and ETSI. Offices: United Kingdom Davidson House, Forbury Square, Reading, RG1 3EU, Tel: Fax: Portugal Edifício Picoas Plaza Rua do Viriato, 13E núcleo 6-4º andar Lisbon Tel: Fax: Brazil Torre Rio Sul, Rua Lauro Muller 116; 27º Andar Sala 2701 CEP: Botafogo Rio de Janeiro Tel: Fax: Spain Edifício Cuzco IV Paseo de la Castellana, 141 8ª planta Madrid Tel: Fax: Ireland Maple House,Temple Road, Blackrock, Co. Dublin Tel: (0) Fax: (0) On the Web General Information info@praesidium.com WeDo Technologies is the number one preferred supplier for revenue andbusiness assurance software and services. Present in 15 countries on 5 continents, with more than 100 innovative bluechip customers in more than 70 countries, the company has a solid and envious project management track record of being on-time and within budget while achieving superior customer satisfaction. Business Assurance RAID, WeDo Technologies flagship software suite covering Revenue Assurance, Fraud Management Business Processes Control has been implemented in a number of different industries where it has delivered significant business results and powerful return on investment. WeDo Technologies pioneered the telecom revenue assurance space in 2002 and is now breaking new ground in the enlarged business assurance arena in Telecom, while also servicing the Retail, Energy and Finance industries. Offices: Portugal _ Lisbon Portugal _ Braga Australia _ Sydney Brazil _ Rio Janeiro Brazil _ Florianopolis Chile _ Santiago Egypt _ Cairo France _ Paris Ireland _ Dublin Malaysia _ Kuala Lumpur Mexico _ Mexico City Panama _ Panama City Poland _ Poznan Poland _ Warsaw Singapore _ Singapore Spain _ Madrid Spain _ Barcelona UK _ Reading USA _ Chicago On the Web
Telecoms Fraud Management Who is winning the Battle?
A Praesidium Business Consultancy White Paper 1 Telecoms Fraud Management Who is winning the Battle? A Praesidium Business Consultancy White Paper MARCH 2011 A Praesidium Business Consultancy White Paper
More informationEmbedded Mobile (M2M) - Telecoms Fraud & Security Management
Embedded Mobile (M2M) - Telecoms Fraud & Security Management A Præsidium Business Consultancy White Paper JULY 2011 A Præsidium Business Consultancy White Paper 2 Table of Contents Background 3 What will
More informationThe Future of Telecoms Risk Management An explanation of the changing nature of Risk in Next Generation Networks
A Præsidium Business Consultancy White Paper 1 The Future of Telecoms Risk Management An explanation of the changing nature of Risk in Next Generation Networks A Præsidium Business Consultancy White Paper
More informationTelecom Business Assurance. Managed Services
Telecom Business Assurance Managed Services Our home market is one of the most competitive and innovative in Europe and we needed to focus on our business while looking for different ways to enhance operational
More informationSecuring the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility
1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance
More informationSTOPPING ICD-10 FRAUD BEFORE IT HAPPENS
www.wedotechnologies.com STOPPING ICD-10 FRAUD BEFORE IT HAPPENS How will the transition to ICD-10 coding affect healthcare payers? PRODUCT POSITIONING PAPER 2 INTRODUCTION Capturing accurate quality clinical
More informationDelaware Consulting s unique focus
Delaware Consulting Delaware Consulting s unique focus Delaware Consulting Delaware Consulting s unique focus This firm is continuing to be at the forefront of the latest development in the fast moving
More informationThe Goods, the Payment and the Mobile!
WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can
More informationOnline security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
More informationFraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper
Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections
More informationMobile Payment in India - Operative Guidelines for Banks
Mobile Payment in India - Operative Guidelines for Banks 1. Introduction 1.1 With the rapid growth in the number of mobile phone subscribers in India (about 261 million as at the end of March 2008 and
More informationOXY GEN GROUP. pay. payment solutions
OXY GEN GROUP pay payment solutions hello. As UK CEO, I m delighted to welcome you to Oxygen8. We ve been at the forefront of multi-channel solutions since 2000. Headquartered in Birmingham, UK, we have
More informationIdentity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
More informationHow To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
More informationMobile Money Market by Transaction Mode, Nature of Payment, Location, Type of Purchase, & by Industry - Global Forecast to 2019
Brochure More information from http://www.researchandmarkets.com/reports/3150389/ Mobile Money Market by Transaction Mode, Nature of Payment, Location, Type of Purchase, & by Industry - Global Forecast
More informationID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters
ID3 Applications Forward thinking solutions for a global industry because identity matters 800 million people One solution ID3 Applications Forward thinking solutions for a global industry Background As
More informationA strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
More informationFinancial Conduct Authority Mobile banking and payments
Financial Conduct Authority Thematic Review TR14/15 Mobile banking and payments September 2014 Mobile banking and payments TR14/15 Contents 1 Executive summary 2 Introduction 2 High level findings 3 Who
More informationPart 1 of Schedule 1 of IFSA
Submission Requirements for Application for Approval to Operate a Payment System or to Issue a Designated Payment Instrument or to be Registered to Provide Merchant Acquiring Services A. BACKGROUND With
More informationPAYWARE MERCHANT MANAGED SERVICE
PAYWARE MERCHANT MANAGED SERVICE PAYware MerchanT Managed Service We focus on payments, so you can drive sales Whether you re selling goods or services, managing your own internal high volume payments
More informationfraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements
TELECOM INSIGHT National Regulatory Authorities are faced with many challenges in establishing a national telecoms environment. Paramount is the need to protect revenue for legitimate local telecommunication
More informationpress information sheet March 2015
press information sheet March 2015 Orange mobile banking and NFC services Fast Facts For more information, contact: orangegroup.pressoffice@orange.com Follow @Orange ON Twitter Mobile banking and NFC services
More informationNew Media for Transit Opportunities and challenges
New Media for Transit Opportunities and challenges Jean COSTANTINI Oslo, Oct 2011 Transportation Systems Agenda Background Ticketing vs. payment NFC Google Wallet Bank cards Open questions 2 Thales, 40
More informationEnd-to-End Cyber Risk Management Solutions from AIG
End-to-End Cyber Risk Management Solutions from AIG In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge
More informationFRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated
More informationJordans Group. Anti-money laundering checks: Overview. Case Study
Anti-money laundering checks: Jordans Group Overview Company Jordans Group Challenge Jordans is a firm of corporate consultants with offices worldwide. They wanted to offer their customers an extended
More informationPICKPOCKETING MWALLETS. A guide to looting mobile financial services
PICKPOCKETING MWALLETS A guide to looting mobile financial services THE GRUGQ Info Sec researcher since 1999 Experience Telcoms Info Sec Banking Info Sec Leads to Mobile Financial Security MOBILE FINANCIAL
More informationReducing Fraud whilst Keeping Transactions in Motion
Reducing Fraud whilst Keeping Transactions in Motion Fraud Today Following a decrease in 2012, fraud is on the rise again, and so are the costs involved in managing it. These factors are in turn driving
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationMobile Virtual Network Operator (MVNO) basics:
Viewpoint Telecom Practice October 2008 Mobile Virtual Network Operator (MVNO) basics: What is behind this mobile business trend MVNOs bring the opportunity to telecom and non-telecom companies to participate
More informationTOP TRUMPS Comparisons of how to pay for goods and services online
Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face
More informationMobile Trust Net. Powering the mobile revolution MOBILE TRUST NET
Mobile Trust Net Powering the mobile revolution MOBILE TRUST NET 1 Trust is everything Trust is critical to the current phase of the mobile revolution. Without trust, users won t try services that ask
More informationIngenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
More informationBusiness white paper Mobile payments
Business white paper Mobile payments Setting standards and gaining customer loyalty Business white paper Page 2 Mobile payments With the rapid development of electronic systems and technology, the adoption
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationHOSTING. Managed Security Solutions. Managed Security. ECSC Solutions
Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT
More informationIs your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
More informationHow to complete the Secure Internet Site Declaration (SISD) form
1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
More informationPreventing Telecommunication Fraud in Machine-to Machine Communications
Preventing Telecommunication Fraud in Machine-to Machine Communications Introduction Machine to Machine (M2M) Communications and the related concept of Embedded Mobile refer to the communication between
More informationMulti-channel mobile marketing and CRM solutions for Mobile Network Operators
Multi-channel mobile marketing and CRM solutions for Mobile Network Operators future mobile technology marketing business entertainment media Interactive Messaging (SMS, MMS, Email and Voice) Mobile Internet
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationOn Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com
On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique
More informationTelecom Analytics: Powering Decision Makers with Real-Time Insights
Telecom Analytics: Powering Decision Makers with Real-Time Insights www.wipro.com Anindito De, Practice Manager - Industry Solutions, CXO Services, Advanced Technologies & Solutions Subhas Mondal, Head
More informationecommerce Delivery Framework: Outlining an Architecture for Successful Web and Mobile Stores
ecommerce Delivery Framework: Outlining an Architecture for Successful Web and Mobile Stores 2 ECOMMERCE DELIVERY FRAMEWORK: OUTLINING AN ARCHITECTURE FOR SUCCESSFUL WEB AND MOBILE STORES Abstract As ecommerce
More informationdefense is the best attack Defenx Company Introduction March 2014
defense is the best attack Defenx Company Introduction March 2014 Defenx the company Defenx is a Swiss based antivirus and security solutions company. Providing security software since 2009, to date its
More informationSecuring Internet Payments. The current regulatory state of play
Securing Internet Payments The current regulatory state of play In recent years the European Union (EU) institutions have shown a growing interest on the security of electronic payments. This interest
More informationMobile phone based business models. Sundar Murthi CAB
Mobile phone based business models Sundar Murthi CAB Session Plan Overview of mobile business Mobiles for banking Guidelines for mobile banking Technologies for mobile banking Mobile banking solutions
More informationEMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
More informationGroup Personal Accident & Business Travel Multinational Playbook
A broker guide to selling Lifeline Plus to multinational clients THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Group Personal Accident & Business Travel Multinational
More informationAccenture Payment Services
Accenture Payment Services Helping banks and other payment service providers to improve business strategy, technology and operational efficiency to transform their business Over 4,000 Payments professionals,
More informationWhat Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya
What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya An Article by Tal Eisner, Senior Director Product Strategy at cvidya, January 2013. Tal Eisner Senior Director Product Strategy
More informationEvolving Mobile Payments Industry Landscape
Evolving Mobile Payments Industry Landscape Mobile Banking: Can the Unbanked Bank on It? Sargent Shriver National Center on Poverty Law webinar August 16, 2012 Marianne Crowe Federal Reserve Bank of Boston
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationwww.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand
www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand Table of Contents Introduction... 03 Network Fault Management operations today... 03 NFV and Network Fault Management...
More informationCyberSource Managed Risk Services ONE POINT OF CONTACT GIVES YOU ACCESS TO EXPERTS
ONE POINT OF CONTACT GIVES YOU ACCESS TO A WHOLE WORLD OF EXPERTS Managed Risk Services Fraud gets in the way of many good businesses It costs time and money to address. It hits margins, diminishes the
More informationHitting the N-Mark with NFC
WHITEPAPER Hitting the N-Mark with NFC This whitepaper is an extract from: NFC Retail Marketing & Mobile Payments Markets, Forecasts & Strategies 2011-2016... information you can do business with Hitting
More informationU.S. Mobile Payments Landscape NCSL Legislative Summit 2013
U.S. Mobile Payments Landscape NCSL Legislative Summit 2013 Marianne Crowe Vice President, Payment Strategies Federal Reserve Bank of Boston August 13, 2013 2 Agenda Overview of Mobile Payments Landscape
More informationChapter 11 E-Commerce
15 th Edition Understanding Computers Today and Tomorrow Comprehensive Chapter 11 E-Commerce Deborah Morley Charles S. Parker Copyright 2015 Cengage Learning Learning Objectives 1. Explain what e-commerce
More informationThe mobile phone is evolving rapidly as a channel for
Payment 2.0: The Next-Generation Model Anurag Shukla, Associate Business Manager, Rajat Tyagi, Principal, and Shrirang Raddi, Engagement Manager, ing and Capital Markets, Infosys Technologies, India phones
More informationPutting Operators at the Centre of
Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified
More informationMobile Financial Services
Mobile Financial Services CANTO AGM 2014 January 27, 2014 27 janvier 2014 1 Agenda MoreMagic and Oberthur Technologies International TopUp and White label The Digital Revolution The Caribbean Opportunity
More informationAnti Fraud Services. Associate Member of..
Anti Fraud Services Associate Member of.. Fraud Context: Global Risk Fraud losses as a percentage of global telecom revenues were estimated at 2.09% in 2013 by the Communications Fraud Control Association
More informationAgilent OSS Wireless QoS Manager
Agilent OSS Wireless QoS Manager The leading-edge solution for wireless-data service assurance New Wireless Challenges To manage today s wireless data services in a manner that ensures top service quality,
More informationFighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationAnnouncement of the transaction with Oracle. Customer Frequently Asked Questions
Announcement of the transaction with Oracle Customer Frequently Asked Questions Objective What did Oracle announce about the transaction with eservglobal? Oracle announced that it has entered into an agreement
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More informationCorporate Presentation. Southern Cone / Andean CEO Conference May, 2012
Corporate Presentation Southern Cone / Andean CEO Conference May, 2012 Our Company 2 Company overview Largest Latin American IT Services provider and an undisputed leader in systems integration, support
More informationDietmar G. Wiedemann. Mobile Commerce Working Group (wi-mobile) dietmar.wiedemann@wi-mbile.de
Results of the SEMOPS Study "Status of E-Payments and M-Payments in the European Union" Dietmar G. Wiedemann Mobile Commerce Working Group (wi-mobile) University of Augsburg dietmar.wiedemann@wi-mbile.de
More informationA CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud
A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts
More informationEMP's vision is to be the leading electronic payments processing company in the emerging markets of Africa and the Middle East.
EMP's vision is to be the leading electronic payments processing company in the emerging markets of Africa and the Middle East. EMP's mission is to be at the forefront of the region's electronic payments
More informationConnecting the Global Enterprise
Fujitsu Forum Munich 2013 Connecting the Global Enterprise Alan Davidson Director of Products, Services & Solutions, Fujitsu Telecommunications Europe 0 FUJITSU LIMITED 2013 The Network Services Market
More informationActorcard Prepaid Visa Card Terms & Conditions
Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid
More informationIS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper
IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper A data breach has the potential to cost retailers millions in lost customers and sales. In this paper we discuss a number of possible
More informationSecurity for the Cloud of Clouds
Security for the Cloud of Clouds Ramy Houssaini. Vice President, BT Security Europe. RamyHoussaini strategicleadership About BT Security BT s end to end Security portfolio integrates classic perimeter
More informationPCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
More informationWhite Paper How are thieves stealing modern vehicles?
SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles
More informationEnterprise Mobility Management
Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by
More informationNovember, 16th & 17th, 2011
November, 16th & 17th, 2011 Company Overview Largest Latin American IT Services provider and an undisputed leader in systems integration, support and IT Outsourcing Independent service provider with world-class
More informationCyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
More informationModern Fraud Prevention from a Bank s Point of View
Modern Fraud Prevention from a Bank s Point of View Extract from an interview between Alexey Golenishev, Payment Schemes Relationships, Head of Department, Alfa-Bank and PLUS Magazine #8 [148] September
More informationThe Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,
More informationOTT, COMPETING OR COLLABORATING OTT ON INDONESIA TELECOMMUNICATION BUSINESS
OTT, COMPETING OR COLLABORATING OTT ON INDONESIA TELECOMMUNICATION BUSINESS Guillaume Mascot December 5 th, 2013 INDUSTRY TRENDS FAST GROWING MARKETS +30% +32% +346% FIXED BROADBAND CONNECTIONS 532 Million
More informationData Breaches and Customer Loyalty Report
Data Breaches and Customer Loyalty Report Broken Trust: Tis the Season to Be Wary Breakdown of trust between consumers and companies Trust is essential in building relationships, and for organizations
More informationDriving new overlay services with instant payments
Point of view Driving new overlay services with instant payments a point of view document by sopra banking software Digitalisation is changing the face of trade, retail, commerce, business and social interactions
More informationwww.wedotechnologies.com RAID RETAIL PROTECT PROFITS, DETECT FRAUD AND CONTROL SUPPLY CHAIN OPERATIONS WITH END-TO-END AUDITING SOFTWARE
www.wedotechnologies.com RAID RETAIL PROTECT PROFITS, DETECT FRAUD AND CONTROL SUPPLY CHAIN OPERATIONS WITH END-TO-END AUDITING SOFTWARE Index WEDO TECHNOLOGIES RAID RETAIL ENTERPRISE BUSINESS Assurance
More informationPayments Transformation - EMV comes to the US
Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent
More informationEMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security
More information4Motion. End-to-end 4G Wireless Broadband
4Motion End-to-end 4G Wireless Broadband Meeting your 4G needs with freedom of choice 4Motion is Alvarion s end-to-end 4G wireless broadband solution, connecting people and businesses everywhere for a
More informationInnovations in retail: Mobile payments
Innovations in retail: Mobile payments Alexandre Stervinou Banque de France Deputy Head Non-cash Means of Payment Oversight Division Regional Payment Systems Workshop - LAC Port of Spain, Trinidad & Tobago
More informationUnisys Security Insights: Global Summary A Consumer Viewpoint - 2015
Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by
More informationThe Mobile Consumer. Insights on Global Trends Impacting Mobile Momentum and Customer Engagement
The Mobile Consumer Insights on Global Trends Impacting Mobile Momentum and Customer Engagement Table of Contents 4 Introduction 5 Devices, Appetite and Use 8 Maturity, Lifestyle and Work 11 Preferences
More informationPrevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA
Prevent Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola Security Solution Architect, EMEA Malware Threat Landscape Growth and Targets % 25 Of real-world malware is caught by anti-virus Malware
More informationRealex Payments Integration Guide - Ecommerce Remote Integration. Version: v1.1
Realex Payments Integration Guide - Ecommerce Remote Integration Version: v1.1 Document Information Document Name: Realex Payments Integration Guide Ecommerce Remote Integration Document Version: 1.1 Release
More informationSDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK
www.wipro.com SDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK Subhas Chandra Mondal Ravi Kumar Emani Rahul Mann Table of Contents 1 Abstract... 3 2 Evaluation of use cases... 3 2.1 vcpe (virtual Consumer
More informationMobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
More informationEMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
More informationVOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
More information