Introduction to the machine learning risk engine THE RSA RISK ENGINE

Size: px
Start display at page:

Download "Introduction to the machine learning risk engine THE RSA RISK ENGINE"

Transcription

1 RSA RISK ENGINE Intrductin t the machine learning risk engine ESSENTIALS Unparalleled fraud detectin The RSA Risk Engine (RE) analyzes an activity t determine hw reasnable and/r typical activities are fr individual users, and if it is indicative f fraud. Multiple, Diverse Data Inputs The RSA RE analyzes multiple, diverse data inputs fr every user activity. The activity details analyzed by the RE are actually a set f data facts that identify the activity, data frm the RSA efraudnetwrk and input frm RSA FraudActin intelligence. Machine Learning Methds Cmbining Bayesian Machine Learning methds with sphisticated analysis f device recgnitin and user behavir enables intelligent decisins t mitigate fraud. In tday s high-tech, fast-paced, hyper-cnnected wrld, peple are spending mre and mre time n the internet, phne, and mbile devices t cmplete mre f their daily activities such as nline banking and shpping. Emplyees, cntractrs, and vendrs demand cnnectins t the enterprise when and where they want t be able t wrk remtely. The cnvenience affrded by the access and availability f the nline wrld, hwever, is nt withut drawbacks. This increased access has brught with it an unparalleled grwth in nline fraudulent activity. Articles abut identity takever, filled with phrases like Trjan, Man in the Middle, Man in the Brwser, and Phishing, are increasingly in the news. These emerging threats have triggered a grwing awareness by institutins and cnsumers alike. These threats are serius and must be addressed. Financial institutins, trying t encurage cnsumer activity while at the same time minimizing lsses frm financial fraud, are lking fr ways t identify and blck fraudulent transactins while letting genuine activities prceed unimpeded. THE RSA RISK ENGINE The RSA Risk Engine (RE) is integrated with RSA Anti-Fraud and Authenticatin slutins t prvide efficient and effective risk detectin f nline activities. Used tday by leading banks, credit and debit card issuers, and ther rganizatins wrldwide, the RE detects, analyzes, scres and manages nline activity fr the purpse f cnsumer and emplyee prtectin. It reduces the risks f privacy and cmpliance expsure, lwers the level f fraud, detects pssible impersnatrs, and identifies new fraud trends as they develp. Authenticatin Feedback Rich feedback frm a variety f methds enables the RSA RE t self learn and tune when intrduced t new fraud patterns. The RE cllects and analyzes vast amunts f lgin and transactinal data frm multiple channels and cmpiles a risk assessment n the integrity f the end user s activity. This risk assessment serves as the basis fr allwing transparent authenticatin whereby the majrity f transactins pass unhindered, identifying nly the mst risky transactins fr additinal authenticatin. Taking int cnsideratin multiple factrs including user behavir and device, the RE emplys a self-learning statistical mdel that can be used alngside a plicy manager t create a layered apprach t security. ENABLES UNPARALLELED FRAUD DETECTION The RE analyzes an activity t determine bth hw reasnable and/r typical this activity is fr a user, and if it is indicative f fraud. It als lks at fraudulent patterns and uses advanced analytics t crrelate amng the varius variables. The accumulated knwledge f decades f security and fraud fighting experience and fraud intelligence wrk cmbined with an intelligent analysis f the data pints cllected thrugh a variety f means and appraches wrk tgether t create the best risk based fraud detectin in the marketplace. The RE cmbines rich data input, machine learning methds and rich authenticatin feedback t prvide intelligent, real-time risk evaluatins t mitigate fraud.

2 RICH DATA INPUT T achieve the best results and assign the mst accurate risk scre, the RE takes as many factrs as pssible int cnsideratin. In additin t quantity, the quality f the data cllected is als cnsidered. The RSA RE analyzes multiple, diverse data inputs fr every user activity. The activity details analyzed by the RE are actually a set f data facts that identify the activity, data frm the RSA efraudnetwrk and input frm RSA FraudActin intelligence. User activity facts can include: The activity type such as Sign-in, Payment, r a Passwrd Change. Details abut the user such as the user name, user language, user cuntry, etc. Details abut the device that is used by the user such as IP address, brwser characteristics, screen reslutin characteristics, etc. Details that are relevant t the mbile device in use, such as mbile sim id, mbile ge lcatin, wifi MAC address, etc. Details abut user interactins with the brwser such as muse mvements and key strkes. Details abut payments such as the amunt, currency, and the payee accunt. Details that can indicate a Trjan malware infectin. RSA efraudnetwrk RSA efraudnetwrk (efn) helps rganizatins t practively identify and track fraudulent prfiles, patterns, and behavirs acrss mre than 150 cuntries. The RSA efn is the industry s first and largest crss-institutinal, crss-platfrm, internatinal, nline fraud netwrk. In existence fr many years, it currently has ver 8,000 cntributrs wrldwide, including financial institutins, credit and debit card issuers, health care firms, Internet service prviders, wireless prviders, high-tech cmpanies, and gvernment and law enfrcement agencies. Nt nly des the intelligence added t the efraudnetwrk data repsitry cme frm multiple surces, it is cmprised f many different types f data elements: IP addresses, device fingerprints, ckies, mule accunts, etc. When a transactin r activity is attempted by a device, IP address, r payee accunt that appears in the efn as fraudulent, it will be taken int accunt with the RSA Risk Engine, which will deem the transactin t be high risk and either blck, prmpt fr further authenticatin, r pass t an analyst fr further review based n custmer plicies. The infrmatin sharing acrss thusands f RSA custmers and 1/2 billin end users and devices creates a vast surce f data. RSA FraudActin Intelligence RSA fraud analysts g "undercver" and scialize with nline fraudsters t gain valuable insight int their practices. This research prvides RSA with a unique understanding f the fraudsters' mtivatin and patterns, invaluable when devising fraud fighting techniques. The FraudActin team will add data t the risk engine by asking questins like - Is this IP address n a blacklist r has it been therwise flagged as suspicius based n RSA research and/r infrmatin frm ur Anti-Fraud Cmmand Center? SOLUTION OVERVIEW

3 RSA Risk Engine Inputs T achieve the best results and assign the mst accurate risk scre t detect fraudulent activity, the RE takes as many factrs as pssible int cnsideratin. In additin t quantity, quality f the data cllected is als taken int cnsideratin via a weighting and nrmalizing prcess. In ther wrds, the mre meaningful the infrmatin cllected and analyzed, the mre valid the cnclusins can be. MACHINE LEARNING METHODS The RE risk mdel is based n RSA s extensive fraud fighting experience. The risk mdel is self-learning meaning it learns frm case reslutin, as well as genuine r failed authenticatin feedback. The RE mdifies its risk predictins based n case investigatin results which autmatically update the risk mdel t be able t catch fraudulent activities that were missed, r genuine activities that were wrngly flagged. The cmbinatin f an efficient statistical machine learning Bayesian mdel with RSA s rich backgrund f fraud expertise, wide range f real wrld knwledge, and rich feedback enables the RE t meet the challenges f detecting and mitigating nline banking and ecmmerce fraud risks in real time. T meet the challenges f fraud detectin, the RSA Risk Engine: Quickly detects new patterns f behavir and adapts the RE analysis t these new patterns. This is valid t bth genuine and fraudulent activity as the patterns fr bth change quickly. Extraplate and generalize based n small samples. As fraud rates are lw, behavir patterns and early warning signs must be extraplated frm small bits f activity. The RE is able t extraplate crrectly by wrking with a backgrund pl f knwledge that enables small activity sets t be understd within a larger cntext. Allw the majrity f users t benefit frm behind the scenes authenticatin while targeting nly a fractin f the ppulatin fr extra security measures. Enable effective real-time learning. Due t the rich feedback, the RE can quickly crrect errrs as they ccur and minimize the impact f errrs.

4 Analyzes Activity Accrding t Histrical Prfiles The RE maintains prfiles fr histrical data cllectin. Fr example: Device prfiling is used fr maintaining the different device related data facts. Fr the web channel, data includes: HTTP headers, perating system versins, and patch levels. Brwser type and versin, sftware versins, display parameters (size and clr depth), languages, time zne, etc. IP address, extracted IP ge lcatin details, and additinal infrmatin n the ISP, IP wner, cnnectin type, etc. Fr mbile devices, the device prfile cntains additinal device identifiers such as the IMEI, the ICCID, and mre. In additin, the ge-lcatin f smart mbile devices is nt based slely n the IP, but als n infrmatin that can be cllected directly frm the mbile device itself. The device prfile is used t determine whether the current device is ne frm which the user usually accesses (data/infrmatin). The RE als checks if a device is knwn frm frmer fraudulent r genuine activities in the emplyee r cnsumer ppulatin as well as acrss activities f ther RSA custmers. User Prfiling is used t maintain behaviral facts related t end-users. The RE attempts t determine if the varius activities are typical fr that user by maintaining a histry r prfile f the user s activities and using that prfile fr cmparisn. The RE lks at items such as the type f payment being made, if the payee accunt has received payment in the past, the amunt characteristic f the user, etc. The RE attempts t determine if the varius activities are typical fr that user by maintaining a prfile f the user's activities and using that prfile fr cmparisn. In additin, the RE als checks the user prfile fr any histrical r real-time indicatin f the user being infected by a Trjan malware. If the activity appears typical, there is n indicatin f a Trjan acting n behalf f the user, and the activity is nt typical f fraudulent behavir, then the transactin will receive a lw risk scre and the user will be authenticated transparently. Otherwise, the RE will assign a higher risk scre t the activity and the user will be asked t authenticate himself/herself. In parallel, the RE tries t determine the dds that a transactin is fraudulent by lking at fraudulent patterns. Examples f fraudulent activity patterns include: Recent alert settings changes fllwed by a payment with high amunt r t a new payee. Payee accunts that have been invlved in previus fraud cnfirmed cases. High accumulated payment amunt instead f ne high amunt transactin, the fraudster cmpletes a number f lwer value transactins. High amunt depsit fllwed by withdrawal f the full amunt shrtly thereafter. Last but nt least, the RE examines the cllected data in relatin t the user and in relatin t the general ppulatin. This is dne t learn what legitimate activity is even thugh it may appear t be fraudulent and reduce false psitives

5 AUTHENTICATION FEEDBACK The Risk Engine is a self-learning mdule, which can change its future predictins based n the fllwing 3 types f feedback: Case management feedback the Risk Engine/RSA Adaptive Authenticatin fr ecmmerce slutin creates cases fr investigatin, and mdifies its future risk predictins based n the case investigatin results changing the risk mdel t be able t catch fraud cases that were missed, r genuine users that were wrngly flagged. Chargeback data feedback similar t case management feedback, the Risk Engine learns f missed fraud frm the chargeback and changes the risk mdel t be able t catch cases that were missed. Authenticatin result feedback - In the same manner as genuine and fraud feedback in case management, if a user was required t pass additinal authenticatin and failed, the risk engine is ntified and the assciated accunt and ther parameters are flagged as having failed authenticatin. Cnsequently, future transactins cming frm the same accunt with similar device parameters and similar behavir will have higher risk scres. If the authenticatin was cmpleted successfully, the risk engine is ntified and the assciated accunt and ther parameters are marked as having successful authenticatin. Cnsequently, future transactins cming frm the same accunt with similar device parameters and similar behavir will have lwer risk scres. THE RISK ENGINE IS A CORE RSA TECHNOLOGY The RSA Risk Engine is a central cmpnent f many RSA authenticatin and antifraud prducts. Fr example, RSA s Identity Prtectin and Verificatin suite f prducts utilize the RSA Risk Engine technlgy t understand risk when dealing with the ever changing fraud landscape. Fllwing is an example f hw RSA Adaptive Authenticatin and Transactin Mnitring rely n the RE t secure nline activities. RSA Adaptive Authenticatin and Transactin Mnitring are multi-channel risk-based authenticatin and fraud detectin platfrms that prvide cst-effective prtectin fr an entire user base. Pwered by RSA s Risk Engine, Adaptive Authenticatin and Transactin Mnitring prvide strng and cnvenient prtectin by mnitring and authenticating user activities based n risk levels, institutinal plicies, and user segmentatin. The RE s ability t learn frm histrical activities and t adapt the risk assessment allws a true risk-based apprach t authenticatin. Risk Based Authenticatin ffers behind-the-scenes mnitring that is invisible t the user. It is nly when an activity is deemed t be high-risk that a user is then challenged t prvide additinal authenticatin, usually in the frm f challenge questins r ut-f-band phne authenticatin. With lw challenge rates and high cmpletin rates, RSA Adaptive Authenticatin and Transactin Mnitring ffer strng prtectin and superir usability, and prvide an ideal slutin fr deplyment t a large user base.

6 RSA Risk Engine is central t RSA Adaptive Authenticatin & Transactin Mnitring With the RSA Risk Engine and input frm the RSA efraudnetwrk, RSA Adaptive Authenticatin and Transactin Mnitring are the frefrnt slutins fr fraud detectin and preventin. CONTACT US T learn mre abut hw EMC prducts, services, and slutins can help slve yur business and IT challenges, cntact yur lcal representative r authrized reseller r visit us at EMC2, EMC, the EMC lg, RSA, efraudnetwrk and the RSA lg are registered trademarks r trademarks f EMC Crpratin in the United States and ther cuntries Cpyright 2012 EMC Crpratin. All rights reserved. Published in the USA. 10/12 Slutin Overview h9096 re sb EMC believes the infrmatin in this dcument is accurate as f its publicatin date. The infrmatin is subject t change withut ntice.

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

What Information Is Collected and How Is It Collected?

What Information Is Collected and How Is It Collected? RCI PRIVACY NOTICE RCI Pacific Pty Ltd is cncerned abut privacy issues and wants yu t be familiar with hw we cllect, use and disclse infrmatin. This Privacy Ntice describes ur practices in cnnectin with

More information

Optimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1

Optimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1 Optimal Payments Extensin Supprting Dcumentatin fr the Extensin Package 20140225 v1.1 Revisin Histry v1.1 Updated Demac Media branding v1.0 Initial Dcument fr Distributin supprt@ptimalpayments.cm Page

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

RSA-Pivotal Security Big Data Reference Architecture RSA & Pivotal combine to help security teams detect threats quicker and speed up response

RSA-Pivotal Security Big Data Reference Architecture RSA & Pivotal combine to help security teams detect threats quicker and speed up response RSA-Pivtal Security Big Data Reference Architecture RSA & Pivtal cmbine t help security teams detect threats quicker and speed up respnse ESSENTIALS RSA and Pivtal are cmbining t help custmers get: Better

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

March 1, 2012. VIA E-mail to fcs-scf@fin.gc.ca

March 1, 2012. VIA E-mail to fcs-scf@fin.gc.ca March 1, 2012 VIA E-mail t fcs-scf@fin.gc.ca Ms. Leah Andersn Directr, Financial Sectr Divisin Department f Finance L Esplanade Laurier 20 th Flr, East Twer 140 O Cnnr Street Ottawa, ON K1A 0G5 Dear Ms.

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

RSA SOLUTION OVERVIEW

RSA SOLUTION OVERVIEW RSA Advanced Threat Detectin and Respnse with RSA Security Analytics SPOTTING ADVANCED THREATS WITH BEHAVIOR ANALYTICS AND DATA SCIENCE MODELING Using Behavir Analytics and Data Science t Identify Cvert

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

PAYMENT GATEWAY ACCOUNT SETUP FORM

PAYMENT GATEWAY ACCOUNT SETUP FORM PAYMENT GATEWAY ACCOUNT SETUP FORM Thank yu fr chsing us fr yur e-cmmerce transactin needs. CyberSurce develps, perates and markets payment transactin prcessing services, as well as a hst f value-adding

More information

2008 BA Insurance Systems Pty Ltd

2008 BA Insurance Systems Pty Ltd 2008 BA Insurance Systems Pty Ltd BAIS have been delivering insurance systems since 1993. Over the last 15 years, technlgy has mved at breakneck speed. BAIS has flurished in this here tday, gne tmrrw sftware

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag Autmating Wrkflws with KwikTag by ImageTag Cnsideratins fr Success in Wrkflw Autmatin KwikTag balances cmprehensive, feature-rich Transactinal Cntent Management with affrdability, fast implementatin, ease

More information

Mobilizing Healthcare Staff with Cloud Services

Mobilizing Healthcare Staff with Cloud Services Mbilizing Healthcare Staff with Clud Services Published May 2012 Mbile Technlgies are changing hw healthcare staff delivers care. With new pwerful integrated slutins available fr the healthcare staff,

More information

HP Email Archiving software for Microsoft Exchange

HP Email Archiving software for Microsoft Exchange HP Email Archiving sftware fr Micrsft Exchange PST Imprt Tls Cmpnents and Deplyment Best Practices Table f Cntents Overview... 2 Prerequisites... 2 Cmpnents... 2 Archive Credentials... 2 PST Lader... 2

More information

Cloud Contact Centre. Getting smart with customer contact

Cloud Contact Centre. Getting smart with customer contact Clud Cntact Centre Getting smart with custmer cntact Getting smart with custmer cntact Clud Cntact Centre enables businesses t deliver superir custmer service every time, quickly and affrdably, with the

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Merchant Processes and Procedures

Merchant Processes and Procedures Merchant Prcesses and Prcedures Table f Cntents EXHIBIT C 1. MERCHANT INTRODUCTION TO T-CHEK 3 1.1 Wh is T-Chek Systems? 3 1.2 Hw t Cntact T-Chek Systems 3 1.3 Hw t Recgnize T-Chek Frms f Payment 3 1.3.1

More information

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003 Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Defining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing

Defining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing Defining Sales Campaign Autmatin Hw e-mail, the Killer App, is best applied t marketing Summary: Cmpanies tday are steadily adpting strategies and technlgies t reach prspects, custmers, and partners thrugh

More information

2013 Small and Medium Businesses Mobile Solutions Study

2013 Small and Medium Businesses Mobile Solutions Study 2013 Small and Medium Businesses Mbile Slutins Study April, 2013 Sanjeev Aggarwal Laurie McCabe 4/15/2013 Cpyright SMB Grup 1 Why is Mbility Slutins Imprtant? In the next 3-4 years the mbile internet traffic

More information

SERVICES BEST PRACTICES

SERVICES BEST PRACTICES SERVICES SERVICES SERVICES BEST PRACTICES WHEN TO ENGAGE US Nt every study requires advanced prgramming and executin. Nt every team needs skills that are called upn nly infrequently. That s why CfMC partners

More information

NC3A SOA Techwatch Day Call for Presentations

NC3A SOA Techwatch Day Call for Presentations NC3A SOA Techwatch Day Call fr Presentatins 1 February 2012 Hsted at NATO C3 Agency, The Hague, The Netherlands By NC3A Chief Technlgy Office (CTO) David Burtn Chief Technlgy fficer Versin 1, 1 December

More information

INTEGRATION OVERVIEW. Introduction... 1. Authentication methods... 2. Learning management system (LMS) integration methods... 2. AICC standard...

INTEGRATION OVERVIEW. Introduction... 1. Authentication methods... 2. Learning management system (LMS) integration methods... 2. AICC standard... INTEGRATION OVERVIEW Cntents Intrductin... 1 Authenticatin methds... 2 Learning management system (LMS) integratin methds... 2 AICC standard... 2 LTI standard... 3 Applicatin prgramming interface (API)

More information

Citrix XenServer from HP Getting Started Guide

Citrix XenServer from HP Getting Started Guide Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

366 Degrees Gaining Extra Degrees of Success

366 Degrees Gaining Extra Degrees of Success 366 Degrees Gaining Extra Degrees f Success In the rush t gain new custmers, cmpanies ften verlk their best custmers the nes they already have. While finding and attracting new custmers is certainly fundamental

More information

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

State Bank Virtual Card FAQs

State Bank Virtual Card FAQs State Bank Virtual Card FAQs 1) What is State Bank Virtual Card? State Bank Virtual Card is a limit Debit card, which can be created using the State Bank Internet Banking facility fr ecmmerce (nline) transactins.

More information

The AppSec How-To: Choosing a SAST Tool

The AppSec How-To: Choosing a SAST Tool The AppSec Hw-T: Chsing a SAST Tl Surce Cde Analysis Made Easy GIVEN THE WIDE RANGE OF SOURCE CODE ANALYSIS TOOLS, SECURITY PROFESSIONALS, AUDITORS AND DEVELOPERS ALIKE ARE FACED WITH THE QUESTION: Hw

More information

An Oracle White Paper January 2013. Comprehensive Data Quality with Oracle Data Integrator and Oracle Enterprise Data Quality

An Oracle White Paper January 2013. Comprehensive Data Quality with Oracle Data Integrator and Oracle Enterprise Data Quality An Oracle White Paper January 2013 Cmprehensive Data Quality with Oracle Data Integratr and Oracle Enterprise Data Quality Executive Overview Pr data quality impacts almst every cmpany. In fact, accrding

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Feature Guide. Virto Commerce Platform

Feature Guide. Virto Commerce Platform Feature Guide Virt Cmmerce Platfrm Fr mre infrmatin abut Virt Cmmerce, visit virtcmmerce.cm r call + 1 323 570 5588 t speak t a representative. Virt Cmmerce Platfrm: Fundatin fr Yur Business Virt Cmmerce

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Advertising, Media, & PR Website Design and Online Marketing Agency SEO Services PPC Marketing Email Marketing

Advertising, Media, & PR Website Design and Online Marketing Agency SEO Services PPC Marketing Email Marketing Advertising, Media, & PR Website Design and Online Marketing Agency SEO Services PPC Marketing Email Marketing We're passinate abut advertising, media, marketing and nline marketing and deliver award winning

More information

SYSTEM MONITORING PLUG-IN FOR MICROSOFT SQL SERVER

SYSTEM MONITORING PLUG-IN FOR MICROSOFT SQL SERVER SYSTEM MONITORING PLUG-IN FOR MICROSOFT SQL SERVER Oracle Enterprise Manager is Oracle s integrated enterprise IT management prduct line, prviding the industry s first cmplete clud lifecycle management

More information

Corporate Standards for data quality and the collation of data for external presentation

Corporate Standards for data quality and the collation of data for external presentation The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published

More information

CRM and Social Media: Maximizing Deeper Customer Relationships

CRM and Social Media: Maximizing Deeper Customer Relationships Seattle Office: 2211 Ellitt Avenue Suite 200 Seattle, Washingtn, 98121 seattle@avanade.cm www.avanade.cm A glbal IT cnsultancy dedicated t using the Micrsft platfrm t help enterprises achieve prfitable

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Mobile Workforce. Improving Productivity, Improving Profitability

Mobile Workforce. Improving Productivity, Improving Profitability Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid

More information

Cloud Application Risks You Can t Manage What You Can t See

Cloud Application Risks You Can t Manage What You Can t See The Unique Alternative t the Big Fur Clud Applicatin Risks Yu Can t Manage What Yu Can t See Managing Unapprved and Apprved Emplyee Clud Adptin March 18, 2015 Agenda Shadw IT trends that are creating visibility

More information

Privacy Policy Statement

Privacy Policy Statement Last revised: July, 2015 Privacy Plicy Statement The Clrx Cmpany (cllectively, we, us, ur ) prvide this Privacy Plicy Statement ( Privacy Statement ) t infrm yu f ur practices regarding the cllectin, use

More information

The Importance of Market Research

The Importance of Market Research The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which

More information

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are:

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are: COE: Hybrid Curse Request fr Prpsals The gals f the Cllege f Educatin Hybrid Curse Funding Prgram are: T supprt the develpment f effective, high-quality instructin that meets the needs and expectatins

More information

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB ("We") are committed to protecting and respecting your privacy.

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB (We) are committed to protecting and respecting your privacy. Effective Date: 2016-04-26 UNIVERSAL MUSIC GROUP PRIVACY POLICY Universal Music AB ("We") are cmmitted t prtecting and respecting yur privacy. This privacy plicy (tgether with ur terms f use and any ther

More information

User Manual Brainloop Outlook Add-In. Version 3.4

User Manual Brainloop Outlook Add-In. Version 3.4 User Manual Brainlp Outlk Add-In Versin 3.4 Cntent 1. Summary... 3 2. Release Ntes... 3 2.1 Prerequisites... 3 2.2 Knwn Restrictins... 4 3. Installatin and Cnfiguratin... 4 3.1 The installatin prgram...

More information

CHECKING ACCOUNTS AND ATM TRANSACTIONS

CHECKING ACCOUNTS AND ATM TRANSACTIONS 1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches

More information

Using PayPal Website Payments Pro with ProductCart

Using PayPal Website Payments Pro with ProductCart Using PayPal Website Payments Pr with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 3 What is Website Payments Pr?... 3 Website Payments Pr and Website Payments Standard...

More information

Credit Report Reissue Recommendation TABLE OF CONTENTS

Credit Report Reissue Recommendation TABLE OF CONTENTS T: Credit Reprting Wrkgrup Frm: Mike Bixby (305) 829-5549 MBixby@LandAm.cm Paul Wills (770) 740-7353 Paul.Wills@Equifax.cm Date: February 13, 2007 Re: Credit Reprt Reissue Recmmendatin The MISMO Credit

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

Electronic Signatures Overview

Electronic Signatures Overview White Paper Electrnic Signatures Overview Versin 1.0 Last Updated: 20-09-2010 www.sutisft.cm Histry f Electrnic Signatures Over 100 years ag, peple were using Mrse cde and the telegraph t electrnically

More information

Getting Ready for Finance

Getting Ready for Finance Getting Ready fr Finance When yur business needs finance it is imprtant t plan yur apprach t ptential lenders prir t making the appintment t present yur applicatin. The reasn fr this is that a well-prepared

More information

HSBC Online Home Loan Application Process

HSBC Online Home Loan Application Process HSBC Online Hme Lan Applicatin Prcess Versin 1.0 Nvember 2005 Cpyright. HSBC Bank Australia Limited 2005 ALL RIGHTS RESERVED N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted,

More information

TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE

TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE A N D R E I A F E R R E I R A, A N T Ó N I O C A S T R O, D E L F I N A S Á S O A R E

More information

esafe SmartSuite Release Notes

esafe SmartSuite Release Notes Cntent Security esafe SmartSuite Release Ntes Versin: 8.5.25.0 Release Ntes Issue Date: May 20, 2010 Abut this release These release ntes prvide a list f the latest additins t esafe SmartSuite. esafe SmartSuite

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the

More information

Implementing SQL Manage Quick Guide

Implementing SQL Manage Quick Guide Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

HEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications

HEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications HEAL-Link Federatin Higher Educatin & Research Exhibit 2 Technical Specificatins & Attribute Specificatins Trust Relatinship Trust relatinship amng the federatin, federatin members and federatin partners

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Business Intelligence represents a fundamental shift in the purpose, objective and use of information

Business Intelligence represents a fundamental shift in the purpose, objective and use of information Overview f BI and rle f DW in BI Business Intelligence & Why is it ppular? Business Intelligence Steps Business Intelligence Cycle Example Scenaris State f Business Intelligence Business Intelligence Tls

More information

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information