Mobile Money Services - Telecoms Risk Management

Size: px
Start display at page:

Download "Mobile Money Services - Telecoms Risk Management"

Transcription

1 Mobile Money Services - Telecoms Risk Management A Præsidium Business Consultancy White Paper February 2012

2 A Præsidium Business Consultancy White Paper 2 Table of Contents Introduction 3 Background 4 What will be offered and who owns the risk? 5 Will the area of risk change? 6 Types of Fraud & Security Attacks & CSP Requirements 7 Considerations for a Successful Risk Management Strategy 8 Summary 9

3 Introduction With the advancements in technology relating to a broad range of financial services that will eventually encompass a global demographic, this will provide an untapped resource for Communication Service Providers (CSPs). A recent survey highlighted there are more than 3 billion mobile phones against 1 billion bank accounts globally. This position therefore presents a tremendous opportunity for CSPs to incorporate Mobile Money (MM) services into their product portfolio ranging from; M-Commerce, M-Payments, M-Remittances and M-Banking. So what will be the implications for effective risk management to meet the challenges for delivering secure and revenue protected MM Services? Some of the answers to these questions will depend on; how the services are offered, the demographics of the target market and the risk appetite of the individual CSPs and their Partners. The types of risks and what will ultimately be required to respond to these new business challenges must be vigorously examined before product launch to understand the potential levels of exposure.

4 A Præsidium Business Consultancy White Paper 4 Background Mobile payments generally involve three key elements; mobile devices, a merchant and the financial sector provider or trusted third party (TTP). The TTP is normally an established entity accepted by all parties to a contractual agreement, deal, or transaction. The TTP, in most instances, has responsibility for authenticating and authorising users in order to secure a payment transaction. They will act as the intermediary for the settlement of payments and any issues arising once a transaction has been processed. For CSPs, MM is being seen as one of the solutions for offsetting the decline witnessed in the more traditional voice revenues. Organisations such as the TM Forum have stated that CSPs are looking to get more from high margin information and services, so M- payments are now very much on the agenda. Mobile payments already encompass a number of categories, including mobile bill payment, mobile point of sale, m-commerce and mobile contactless such as Near Field Communications (NFC). In a number of countries, especially Africa where the adoption of MM is already a lucrative alternative for increasing revenues, the customer has truly embraced the experience of using banking services. There have been a host of new entrants into this financial space looking to challenge the market position of the established players like PayPal and Google, as they realise the real potential for increased services and revenues and how they need to work with the telecommunication industry. There will be further increased competition as CSPs, web players and the financial sector battle for pole position in the mobile payments revenue chain. The consumer will be continuing to seek out these facilitators for providing feature rich services and will expect fraud and security resilience to be in place to protect them. There will also be the criminal element who will be seeking out the service vulnerabilities to exploit them for their own financial gain, whether this relates to physical device to device transactions or SMS transfer of funds. Personal and financial information will be targeted. In a number of countries, especially Africa where the adoption of MM is already a lucrative alternative for increasing revenues, the customer has truly embraced the experience of using banking services The criminal fraternity are innovative and forward thinking when deploying their attacks on MM services. Experience has already clearly demonstrated some high profile fraud and security breaches. The most talked about being that of SIM Swap fraud which has engulfed certain countries and resulted in extremely negative public relations. Consumers will not consider or care about the fraudster s methods, all consumers will remember is that it was the CSP s SIM card that facilitated the fraud to extract their funds. Fraudsters simply assessed the level of exposure to fraud and exploited the features by remaining focused in obtaining exactly what they wanted control over the bank account with the method for achieving this being the SIM card. CSPs must learn from these experiences and not become complacent or forget that these are highly organised fraudsters. They operate their own businesses with their business model spanning all types of technology and crossing international boundaries. They inherently rely on the CSP s inability to respond and recover to fraud and security breaches in a timely manner.

5 A Præsidium Business Consultancy White Paper 5 What will be offered and who owns the risk? The breadth of services available will vary, but the most commonly recognised areas will include: mobile payments, mobile commerce and mobile remittances and mobile banking. The range of activities can be further broken down to include basic bank account management conducted via information alerts to performing payment transactions and purchases via devices. The aspects of mobile payments can relate to specific goods or services from different points of sale, to performing remote payments via person to person transfer, with the mobile banking element in essence acting as the wallet. The latter will involve activities being conducted in-country and may extend across international boundaries where the applicable rules and laws relating to anti money laundering (AML) will need to be applied by the CSP. The controls of Know Your Customer (KYC) will also be relevant in this environment and make the necessity for true customer identity even more essential. Vendors, retailers, merchants, content providers, CSPs and banks are all actively establishing new services and schemes and for each aspect there will be a requirement to consider the risk and who has responsibility for protecting their specific part. The introduction of these new players will mean ownership and accountability for risk will need to be determined at each point in the service delivery mechanism. For example, if SMS is used as the delivery channel, SMS traffic will increase so the CSP s fraud team will need to fully understand SMS and be in a position to monitor user s profiles for signs of abuse. If USSD is used as the delivery mechanism, then sufficient protection will need to be developed around the platform and associated processes. Each area of technology and the associated processes must be assessed to carry the MM service, with risk protection considered from an end-to-end perspective. The aspects of mobile payments can relate to specific goods or services from different points of sale, to performing remote payments via person to person transfer, with the mobile banking element in essence acting as the wallet. NFC is emerging as a major enabler for items such as electronic money, ticketing, document transfer, configuration of terminals in different locations and even tracking movement. The technology is compatible with existing contactless payment terminals already installed at retail outlets worldwide and therefore is a very attractive proposition for CSPs. It will also attract the criminal element as it is open to social & technical security and fraud risks. There are situations now where chip-based passports are being targeted and attacked by criminal groups to steal identities. The software to do this is available on the web using the same radio frequency identification (RFID) technology as NFC.

6 Will the area of risk change? There will always be risks associated with providing MM services but there will be varying and different levels of risk. Questions will be asked over ownership and accountability of the risk. Should it be a concern for the mobile customer or will the merchant take responsibility? In addition, the consumer will need to be increasingly aware of the risks associated to using a mobile phone for payments, realising that now the real value of the phone increases as it uses these enriched services and becomes a more valuable commodity to fraudsters and hackers. Where consumers utilise the proposed full range of MM services, then in essence the mobile will replace the traditional wallet or purse and will need to be protected accordingly. Consumers will need to keep track of exactly where their phone is at all times and allow caution when visiting websites using the phone s browser, clicking on links, or responding to text messages. There must be trust and integrity of all transactions. MM solutions will encompass a range of devices and end to end services involving multiple entities who in some instances will be partnering for the first time. This will present some of the traditional risks facing Telcos as well as introducing new ones and will result in even more formation of strategic partnerships, and therefore, from a risk perspective, increased reliance on these third party providers. CSPs must consider the implications and requirements to enable them to minimize their exposure to fraud and security risks and for actually assuring their revenues associated to devices, applications, processes and different business models....the consumer will need to be increasingly aware of the risks associated to using a mobile phone for payments, realising that now the real value of the phone increases as it uses these enriched services and becomes a more valuable commodity to fraudsters and hackers. Essentially, when considering risks, this will mean different things to different parties depending on where they are within the service delivery chain. CSPs need to consider the existing fraud threats that can manifest themselves in the MM arena, for example, subscription fraud, revenue share fraud, account credits and adjustments. This means evaluating their existing fraud type exposure to determine which areas will be impacted and either increase, reduce or result in new fraud risks. For the Revenue Assurance (RA) professional, they will need to consider the new data sources, credit balance mismatching, failed/missing transactions, refund settlements, revenue share model and dispute management. Financial institutions have a relatively strong track record relating to effective security management, however, their knowledge and understanding of Telecoms systems and associated risk management is still in its infancy. Co-operation and education will be a fundamental requirement when considering both the security and fraud management coverage of a CSP s MM products and services portfolio. Developing coherent and effective revenue protection strategies will be essential.

7 A Præsidium Business Consultancy White Paper 7 Types of Fraud & Security Attacks & CSP Requirements So what can we expect to see? What type of attacks have already happened or are likely to manifest themselves as consumer uptake grows? Some of the risks will be evolutions of existing risk types, so applying old techniques to new products and services in the MM market. These will include risks related to: Fraudulent Customer Application applicant falsifies identity to obtain a credit card Account takeover - criminal gathers pertinent documents to take over an account Trojans & Viruses applications downloaded by SMS or via App stores used to steal information or run programs to defraud customers Lost and Stolen illegal use of a credit card Skimming data stored in a mobile is copied to another mobile Spoofing - cloning of sites or webpages from which orders can be placed False merchant sites - designed to get people to hand over their credit card details Snooping - Intercepting unencrypted or encrypted data (access to Key/PIN) Phishing illegal interception of personal details e.g. credit card numbers Cloning copying of electronic customer information on to another device or terminal Billboard Phishing - unique threat to NFC to capture data MiM (Man In The Middle) capturing data over the air during transfer Pretexting - Social engineering to perform an unauthorised transaction Internal Fraud Persistent risk among operators/financial institutions Partner Fraud additional third parties leading to potential risk When the value of the services offered in the lucrative MM market increases, it is certain that the level and amount of concerted attacks by criminal groups will increase. The fraudsters will gravitate to these offerings due to the anonymity and geographical freedom they can offer.

8 A Præsidium Business Consultancy White Paper 8 Considerations for a Successful Risk Management Strategy What defences can be defined? A through and logical review of what and how the MM service is put to market will be critical to its success. Just one or two well publicised breaches in security will cause significant damage to the adoption of the service. From a control perspective, there are several key areas that must be considered by CSPs before launching services. Service Offering & Management Customer Identification and Registration Processes Financial Deposits & Transaction Management Data Storage & Usability for Fraud Management Customer Terms & Conditions and Liabilities Potential Fraud Controls - prevention, monitoring, investigation, reporting, KPIs Product Design & Technology Integrator Initiatives controls, visibility of activities Technical Controls control validations Third party Interfaces Product Management pilot phase through to full delivery Security Considerations authentication certification (standards & testing) Customer Monitoring Internal Fraud Persistent risk among operators/financial institutions Partner Fraud additional third parties leading to potential risk

9 A Præsidium Business Consultancy White Paper 9 Summary While the opportunities for MM services are great, providing a new lucrative potential revenue stream for CSPs, the risks can be even greater. It s no longer just the cost of carrying a call, but real money. The battle against fraudsters will never be won due to the fast moving telecoms environment and the drive to launch more complex products and services quickly to attract market share and maintain that competitive edge. With effective risk management, strong mitigation can be put in place. Evaluating the effectiveness of planned controls & initiatives ranging from technical, people and process related perspectives is an essential starting block to launch the service. Praesidium is able to offer expert support by combining it s deep telecoms security expertise with a solid understanding of risk management and experience in MM for new technology, products and services offered by CSPs. It can provide the depth of knowledge to review the Mobile Money Service in place or being proposed from a risk and security perspective. This includes assessing the proposed solution s architectural design for technical controls and the secure delivery mechanisms of the service and interface to the bearers (e.g. IVR, SMS, WAP, Data, Internet, NFC, etc) used to convey the transaction. Evaluating the effectiveness of planned controls & initiatives ranging from technical, people and process related perspectives is an essential starting block to launch the service. Determining the required controls for securing the service points of measurement, reconciliation and reporting are the essential elements to maintain and grow a profitable MM service. Effective risk management relating to the envisaged changes and introduction of new risks can be a time consuming and overwhelming activity especially for those CSPs who are not yet mature, or do not have MM expertise in the development of fraud and security control and prevention strategies related to these services. Præsidium is able to support CSPs in this space, having served over 100 clientes worldwide to review, advise upon and implement fraud and security strategies, train risk management personnel, or deliver and optimise risk management solutions.

10 A Præsidium Business Consultancy White Paper 10 About Præsidium About WeDo Technologies Præsidium is a Global Business Assurance consultancy. Founded in 1997, the company has successfully provided risk management consultancy to more than 100 Communication Service Providers in over 80 countries on 6 continents. Præsidium has gained solid recognition in the market amongst its substantial customer base and among global standards agencies. These include the GSMA Security Group & Fraud Forum, the Telemanagement Forum and ETSI. Offices: United Kingdom Davidson House, Forbury Square, Reading, RG1 3EU, Tel: Fax: Portugal Edifício Picoas Plaza Rua do Viriato, 13E núcleo 6-4º andar Lisbon Tel: Fax: Brazil Torre Rio Sul, Rua Lauro Muller 116; 27º Andar Sala 2701 CEP: Botafogo Rio de Janeiro Tel: Fax: Spain Edifício Cuzco IV Paseo de la Castellana, 141 8ª planta Madrid Tel: Fax: Ireland Maple House,Temple Road, Blackrock, Co. Dublin Tel: (0) Fax: (0) On the Web General Information info@praesidium.com WeDo Technologies is the number one preferred supplier for revenue andbusiness assurance software and services. Present in 15 countries on 5 continents, with more than 100 innovative bluechip customers in more than 70 countries, the company has a solid and envious project management track record of being on-time and within budget while achieving superior customer satisfaction. Business Assurance RAID, WeDo Technologies flagship software suite covering Revenue Assurance, Fraud Management Business Processes Control has been implemented in a number of different industries where it has delivered significant business results and powerful return on investment. WeDo Technologies pioneered the telecom revenue assurance space in 2002 and is now breaking new ground in the enlarged business assurance arena in Telecom, while also servicing the Retail, Energy and Finance industries. Offices: Portugal _ Lisbon Portugal _ Braga Australia _ Sydney Brazil _ Rio Janeiro Brazil _ Florianopolis Chile _ Santiago Egypt _ Cairo France _ Paris Ireland _ Dublin Malaysia _ Kuala Lumpur Mexico _ Mexico City Panama _ Panama City Poland _ Poznan Poland _ Warsaw Singapore _ Singapore Spain _ Madrid Spain _ Barcelona UK _ Reading USA _ Chicago On the Web

Telecoms Fraud Management Who is winning the Battle?

Telecoms Fraud Management Who is winning the Battle? A Praesidium Business Consultancy White Paper 1 Telecoms Fraud Management Who is winning the Battle? A Praesidium Business Consultancy White Paper MARCH 2011 A Praesidium Business Consultancy White Paper

More information

Embedded Mobile (M2M) - Telecoms Fraud & Security Management

Embedded Mobile (M2M) - Telecoms Fraud & Security Management Embedded Mobile (M2M) - Telecoms Fraud & Security Management A Præsidium Business Consultancy White Paper JULY 2011 A Præsidium Business Consultancy White Paper 2 Table of Contents Background 3 What will

More information

The Future of Telecoms Risk Management An explanation of the changing nature of Risk in Next Generation Networks

The Future of Telecoms Risk Management An explanation of the changing nature of Risk in Next Generation Networks A Præsidium Business Consultancy White Paper 1 The Future of Telecoms Risk Management An explanation of the changing nature of Risk in Next Generation Networks A Præsidium Business Consultancy White Paper

More information

Telecom Business Assurance. Managed Services

Telecom Business Assurance. Managed Services Telecom Business Assurance Managed Services Our home market is one of the most competitive and innovative in Europe and we needed to focus on our business while looking for different ways to enhance operational

More information

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility 1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance

More information

STOPPING ICD-10 FRAUD BEFORE IT HAPPENS

STOPPING ICD-10 FRAUD BEFORE IT HAPPENS www.wedotechnologies.com STOPPING ICD-10 FRAUD BEFORE IT HAPPENS How will the transition to ICD-10 coding affect healthcare payers? PRODUCT POSITIONING PAPER 2 INTRODUCTION Capturing accurate quality clinical

More information

Delaware Consulting s unique focus

Delaware Consulting s unique focus Delaware Consulting Delaware Consulting s unique focus Delaware Consulting Delaware Consulting s unique focus This firm is continuing to be at the forefront of the latest development in the fast moving

More information

The Goods, the Payment and the Mobile!

The Goods, the Payment and the Mobile! WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can

More information

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat. Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity

More information

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections

More information

Mobile Payment in India - Operative Guidelines for Banks

Mobile Payment in India - Operative Guidelines for Banks Mobile Payment in India - Operative Guidelines for Banks 1. Introduction 1.1 With the rapid growth in the number of mobile phone subscribers in India (about 261 million as at the end of March 2008 and

More information

OXY GEN GROUP. pay. payment solutions

OXY GEN GROUP. pay. payment solutions OXY GEN GROUP pay payment solutions hello. As UK CEO, I m delighted to welcome you to Oxygen8. We ve been at the forefront of multi-channel solutions since 2000. Headquartered in Birmingham, UK, we have

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Mobile Money Market by Transaction Mode, Nature of Payment, Location, Type of Purchase, & by Industry - Global Forecast to 2019

Mobile Money Market by Transaction Mode, Nature of Payment, Location, Type of Purchase, & by Industry - Global Forecast to 2019 Brochure More information from http://www.researchandmarkets.com/reports/3150389/ Mobile Money Market by Transaction Mode, Nature of Payment, Location, Type of Purchase, & by Industry - Global Forecast

More information

ID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters

ID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters ID3 Applications Forward thinking solutions for a global industry because identity matters 800 million people One solution ID3 Applications Forward thinking solutions for a global industry Background As

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Financial Conduct Authority Mobile banking and payments

Financial Conduct Authority Mobile banking and payments Financial Conduct Authority Thematic Review TR14/15 Mobile banking and payments September 2014 Mobile banking and payments TR14/15 Contents 1 Executive summary 2 Introduction 2 High level findings 3 Who

More information

Part 1 of Schedule 1 of IFSA

Part 1 of Schedule 1 of IFSA Submission Requirements for Application for Approval to Operate a Payment System or to Issue a Designated Payment Instrument or to be Registered to Provide Merchant Acquiring Services A. BACKGROUND With

More information

PAYWARE MERCHANT MANAGED SERVICE

PAYWARE MERCHANT MANAGED SERVICE PAYWARE MERCHANT MANAGED SERVICE PAYware MerchanT Managed Service We focus on payments, so you can drive sales Whether you re selling goods or services, managing your own internal high volume payments

More information

fraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements

fraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements TELECOM INSIGHT National Regulatory Authorities are faced with many challenges in establishing a national telecoms environment. Paramount is the need to protect revenue for legitimate local telecommunication

More information

press information sheet March 2015

press information sheet March 2015 press information sheet March 2015 Orange mobile banking and NFC services Fast Facts For more information, contact: orangegroup.pressoffice@orange.com Follow @Orange ON Twitter Mobile banking and NFC services

More information

New Media for Transit Opportunities and challenges

New Media for Transit Opportunities and challenges New Media for Transit Opportunities and challenges Jean COSTANTINI Oslo, Oct 2011 Transportation Systems Agenda Background Ticketing vs. payment NFC Google Wallet Bank cards Open questions 2 Thales, 40

More information

End-to-End Cyber Risk Management Solutions from AIG

End-to-End Cyber Risk Management Solutions from AIG End-to-End Cyber Risk Management Solutions from AIG In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge

More information

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated

More information

Jordans Group. Anti-money laundering checks: Overview. Case Study

Jordans Group. Anti-money laundering checks: Overview. Case Study Anti-money laundering checks: Jordans Group Overview Company Jordans Group Challenge Jordans is a firm of corporate consultants with offices worldwide. They wanted to offer their customers an extended

More information

PICKPOCKETING MWALLETS. A guide to looting mobile financial services

PICKPOCKETING MWALLETS. A guide to looting mobile financial services PICKPOCKETING MWALLETS A guide to looting mobile financial services THE GRUGQ Info Sec researcher since 1999 Experience Telcoms Info Sec Banking Info Sec Leads to Mobile Financial Security MOBILE FINANCIAL

More information

Reducing Fraud whilst Keeping Transactions in Motion

Reducing Fraud whilst Keeping Transactions in Motion Reducing Fraud whilst Keeping Transactions in Motion Fraud Today Following a decrease in 2012, fraud is on the rise again, and so are the costs involved in managing it. These factors are in turn driving

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Mobile Virtual Network Operator (MVNO) basics:

Mobile Virtual Network Operator (MVNO) basics: Viewpoint Telecom Practice October 2008 Mobile Virtual Network Operator (MVNO) basics: What is behind this mobile business trend MVNOs bring the opportunity to telecom and non-telecom companies to participate

More information

TOP TRUMPS Comparisons of how to pay for goods and services online

TOP TRUMPS Comparisons of how to pay for goods and services online Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face

More information

Mobile Trust Net. Powering the mobile revolution MOBILE TRUST NET

Mobile Trust Net. Powering the mobile revolution MOBILE TRUST NET Mobile Trust Net Powering the mobile revolution MOBILE TRUST NET 1 Trust is everything Trust is critical to the current phase of the mobile revolution. Without trust, users won t try services that ask

More information

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

Ingenious Systems. Evolute System's. Mobile Payment. Initiative Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial

More information

Business white paper Mobile payments

Business white paper Mobile payments Business white paper Mobile payments Setting standards and gaining customer loyalty Business white paper Page 2 Mobile payments With the rapid development of electronic systems and technology, the adoption

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Preventing Telecommunication Fraud in Machine-to Machine Communications

Preventing Telecommunication Fraud in Machine-to Machine Communications Preventing Telecommunication Fraud in Machine-to Machine Communications Introduction Machine to Machine (M2M) Communications and the related concept of Embedded Mobile refer to the communication between

More information

Multi-channel mobile marketing and CRM solutions for Mobile Network Operators

Multi-channel mobile marketing and CRM solutions for Mobile Network Operators Multi-channel mobile marketing and CRM solutions for Mobile Network Operators future mobile technology marketing business entertainment media Interactive Messaging (SMS, MMS, Email and Voice) Mobile Internet

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com

On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique

More information

Telecom Analytics: Powering Decision Makers with Real-Time Insights

Telecom Analytics: Powering Decision Makers with Real-Time Insights Telecom Analytics: Powering Decision Makers with Real-Time Insights www.wipro.com Anindito De, Practice Manager - Industry Solutions, CXO Services, Advanced Technologies & Solutions Subhas Mondal, Head

More information

ecommerce Delivery Framework: Outlining an Architecture for Successful Web and Mobile Stores

ecommerce Delivery Framework: Outlining an Architecture for Successful Web and Mobile Stores ecommerce Delivery Framework: Outlining an Architecture for Successful Web and Mobile Stores 2 ECOMMERCE DELIVERY FRAMEWORK: OUTLINING AN ARCHITECTURE FOR SUCCESSFUL WEB AND MOBILE STORES Abstract As ecommerce

More information

defense is the best attack Defenx Company Introduction March 2014

defense is the best attack Defenx Company Introduction March 2014 defense is the best attack Defenx Company Introduction March 2014 Defenx the company Defenx is a Swiss based antivirus and security solutions company. Providing security software since 2009, to date its

More information

Securing Internet Payments. The current regulatory state of play

Securing Internet Payments. The current regulatory state of play Securing Internet Payments The current regulatory state of play In recent years the European Union (EU) institutions have shown a growing interest on the security of electronic payments. This interest

More information

Mobile phone based business models. Sundar Murthi CAB

Mobile phone based business models. Sundar Murthi CAB Mobile phone based business models Sundar Murthi CAB Session Plan Overview of mobile business Mobiles for banking Guidelines for mobile banking Technologies for mobile banking Mobile banking solutions

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Group Personal Accident & Business Travel Multinational Playbook

Group Personal Accident & Business Travel Multinational Playbook A broker guide to selling Lifeline Plus to multinational clients THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Group Personal Accident & Business Travel Multinational

More information

Accenture Payment Services

Accenture Payment Services Accenture Payment Services Helping banks and other payment service providers to improve business strategy, technology and operational efficiency to transform their business Over 4,000 Payments professionals,

More information

What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya

What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya An Article by Tal Eisner, Senior Director Product Strategy at cvidya, January 2013. Tal Eisner Senior Director Product Strategy

More information

Evolving Mobile Payments Industry Landscape

Evolving Mobile Payments Industry Landscape Evolving Mobile Payments Industry Landscape Mobile Banking: Can the Unbanked Bank on It? Sargent Shriver National Center on Poverty Law webinar August 16, 2012 Marianne Crowe Federal Reserve Bank of Boston

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand

www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand Table of Contents Introduction... 03 Network Fault Management operations today... 03 NFV and Network Fault Management...

More information

CyberSource Managed Risk Services ONE POINT OF CONTACT GIVES YOU ACCESS TO EXPERTS

CyberSource Managed Risk Services ONE POINT OF CONTACT GIVES YOU ACCESS TO EXPERTS ONE POINT OF CONTACT GIVES YOU ACCESS TO A WHOLE WORLD OF EXPERTS Managed Risk Services Fraud gets in the way of many good businesses It costs time and money to address. It hits margins, diminishes the

More information

Hitting the N-Mark with NFC

Hitting the N-Mark with NFC WHITEPAPER Hitting the N-Mark with NFC This whitepaper is an extract from: NFC Retail Marketing & Mobile Payments Markets, Forecasts & Strategies 2011-2016... information you can do business with Hitting

More information

U.S. Mobile Payments Landscape NCSL Legislative Summit 2013

U.S. Mobile Payments Landscape NCSL Legislative Summit 2013 U.S. Mobile Payments Landscape NCSL Legislative Summit 2013 Marianne Crowe Vice President, Payment Strategies Federal Reserve Bank of Boston August 13, 2013 2 Agenda Overview of Mobile Payments Landscape

More information

Chapter 11 E-Commerce

Chapter 11 E-Commerce 15 th Edition Understanding Computers Today and Tomorrow Comprehensive Chapter 11 E-Commerce Deborah Morley Charles S. Parker Copyright 2015 Cengage Learning Learning Objectives 1. Explain what e-commerce

More information

The mobile phone is evolving rapidly as a channel for

The mobile phone is evolving rapidly as a channel for Payment 2.0: The Next-Generation Model Anurag Shukla, Associate Business Manager, Rajat Tyagi, Principal, and Shrirang Raddi, Engagement Manager, ing and Capital Markets, Infosys Technologies, India phones

More information

Putting Operators at the Centre of

Putting Operators at the Centre of Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified

More information

Mobile Financial Services

Mobile Financial Services Mobile Financial Services CANTO AGM 2014 January 27, 2014 27 janvier 2014 1 Agenda MoreMagic and Oberthur Technologies International TopUp and White label The Digital Revolution The Caribbean Opportunity

More information

Anti Fraud Services. Associate Member of..

Anti Fraud Services. Associate Member of.. Anti Fraud Services Associate Member of.. Fraud Context: Global Risk Fraud losses as a percentage of global telecom revenues were estimated at 2.09% in 2013 by the Communications Fraud Control Association

More information

Agilent OSS Wireless QoS Manager

Agilent OSS Wireless QoS Manager Agilent OSS Wireless QoS Manager The leading-edge solution for wireless-data service assurance New Wireless Challenges To manage today s wireless data services in a manner that ensures top service quality,

More information

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Announcement of the transaction with Oracle. Customer Frequently Asked Questions

Announcement of the transaction with Oracle. Customer Frequently Asked Questions Announcement of the transaction with Oracle Customer Frequently Asked Questions Objective What did Oracle announce about the transaction with eservglobal? Oracle announced that it has entered into an agreement

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Corporate Presentation. Southern Cone / Andean CEO Conference May, 2012

Corporate Presentation. Southern Cone / Andean CEO Conference May, 2012 Corporate Presentation Southern Cone / Andean CEO Conference May, 2012 Our Company 2 Company overview Largest Latin American IT Services provider and an undisputed leader in systems integration, support

More information

Dietmar G. Wiedemann. Mobile Commerce Working Group (wi-mobile) dietmar.wiedemann@wi-mbile.de

Dietmar G. Wiedemann. Mobile Commerce Working Group (wi-mobile) dietmar.wiedemann@wi-mbile.de Results of the SEMOPS Study "Status of E-Payments and M-Payments in the European Union" Dietmar G. Wiedemann Mobile Commerce Working Group (wi-mobile) University of Augsburg dietmar.wiedemann@wi-mbile.de

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

EMP's vision is to be the leading electronic payments processing company in the emerging markets of Africa and the Middle East.

EMP's vision is to be the leading electronic payments processing company in the emerging markets of Africa and the Middle East. EMP's vision is to be the leading electronic payments processing company in the emerging markets of Africa and the Middle East. EMP's mission is to be at the forefront of the region's electronic payments

More information

Connecting the Global Enterprise

Connecting the Global Enterprise Fujitsu Forum Munich 2013 Connecting the Global Enterprise Alan Davidson Director of Products, Services & Solutions, Fujitsu Telecommunications Europe 0 FUJITSU LIMITED 2013 The Network Services Market

More information

Actorcard Prepaid Visa Card Terms & Conditions

Actorcard Prepaid Visa Card Terms & Conditions Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid

More information

IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper

IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper A data breach has the potential to cost retailers millions in lost customers and sales. In this paper we discuss a number of possible

More information

Security for the Cloud of Clouds

Security for the Cloud of Clouds Security for the Cloud of Clouds Ramy Houssaini. Vice President, BT Security Europe. RamyHoussaini strategicleadership About BT Security BT s end to end Security portfolio integrates classic perimeter

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

White Paper How are thieves stealing modern vehicles?

White Paper How are thieves stealing modern vehicles? SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles

More information

Enterprise Mobility Management

Enterprise Mobility Management Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by

More information

November, 16th & 17th, 2011

November, 16th & 17th, 2011 November, 16th & 17th, 2011 Company Overview Largest Latin American IT Services provider and an undisputed leader in systems integration, support and IT Outsourcing Independent service provider with world-class

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Modern Fraud Prevention from a Bank s Point of View

Modern Fraud Prevention from a Bank s Point of View Modern Fraud Prevention from a Bank s Point of View Extract from an interview between Alexey Golenishev, Payment Schemes Relationships, Head of Department, Alfa-Bank and PLUS Magazine #8 [148] September

More information

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,

More information

OTT, COMPETING OR COLLABORATING OTT ON INDONESIA TELECOMMUNICATION BUSINESS

OTT, COMPETING OR COLLABORATING OTT ON INDONESIA TELECOMMUNICATION BUSINESS OTT, COMPETING OR COLLABORATING OTT ON INDONESIA TELECOMMUNICATION BUSINESS Guillaume Mascot December 5 th, 2013 INDUSTRY TRENDS FAST GROWING MARKETS +30% +32% +346% FIXED BROADBAND CONNECTIONS 532 Million

More information

Data Breaches and Customer Loyalty Report

Data Breaches and Customer Loyalty Report Data Breaches and Customer Loyalty Report Broken Trust: Tis the Season to Be Wary Breakdown of trust between consumers and companies Trust is essential in building relationships, and for organizations

More information

Driving new overlay services with instant payments

Driving new overlay services with instant payments Point of view Driving new overlay services with instant payments a point of view document by sopra banking software Digitalisation is changing the face of trade, retail, commerce, business and social interactions

More information

www.wedotechnologies.com RAID RETAIL PROTECT PROFITS, DETECT FRAUD AND CONTROL SUPPLY CHAIN OPERATIONS WITH END-TO-END AUDITING SOFTWARE

www.wedotechnologies.com RAID RETAIL PROTECT PROFITS, DETECT FRAUD AND CONTROL SUPPLY CHAIN OPERATIONS WITH END-TO-END AUDITING SOFTWARE www.wedotechnologies.com RAID RETAIL PROTECT PROFITS, DETECT FRAUD AND CONTROL SUPPLY CHAIN OPERATIONS WITH END-TO-END AUDITING SOFTWARE Index WEDO TECHNOLOGIES RAID RETAIL ENTERPRISE BUSINESS Assurance

More information

Payments Transformation - EMV comes to the US

Payments Transformation - EMV comes to the US Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

Best Practices for a BYOD World

Best Practices for a BYOD World Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile

More information

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security

More information

4Motion. End-to-end 4G Wireless Broadband

4Motion. End-to-end 4G Wireless Broadband 4Motion End-to-end 4G Wireless Broadband Meeting your 4G needs with freedom of choice 4Motion is Alvarion s end-to-end 4G wireless broadband solution, connecting people and businesses everywhere for a

More information

Innovations in retail: Mobile payments

Innovations in retail: Mobile payments Innovations in retail: Mobile payments Alexandre Stervinou Banque de France Deputy Head Non-cash Means of Payment Oversight Division Regional Payment Systems Workshop - LAC Port of Spain, Trinidad & Tobago

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

The Mobile Consumer. Insights on Global Trends Impacting Mobile Momentum and Customer Engagement

The Mobile Consumer. Insights on Global Trends Impacting Mobile Momentum and Customer Engagement The Mobile Consumer Insights on Global Trends Impacting Mobile Momentum and Customer Engagement Table of Contents 4 Introduction 5 Devices, Appetite and Use 8 Maturity, Lifestyle and Work 11 Preferences

More information

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA Prevent Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola Security Solution Architect, EMEA Malware Threat Landscape Growth and Targets % 25 Of real-world malware is caught by anti-virus Malware

More information

Realex Payments Integration Guide - Ecommerce Remote Integration. Version: v1.1

Realex Payments Integration Guide - Ecommerce Remote Integration. Version: v1.1 Realex Payments Integration Guide - Ecommerce Remote Integration Version: v1.1 Document Information Document Name: Realex Payments Integration Guide Ecommerce Remote Integration Document Version: 1.1 Release

More information

SDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK

SDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK www.wipro.com SDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK Subhas Chandra Mondal Ravi Kumar Emani Rahul Mann Table of Contents 1 Abstract... 3 2 Evaluation of use cases... 3 2.1 vcpe (virtual Consumer

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information