August 25, 2010 Updated: August 27, 2010 Market Overview: Fraud Management Solutions

Size: px
Start display at page:

Download "August 25, 2010 Updated: August 27, 2010 Market Overview: Fraud Management Solutions"

Transcription

1 August 25, 2010 Updated: August 27, 2010 Market Overview: Fraud Management Solutions by Andras Cser for Security & Risk Professionals Making Leaders Successful Every Day

2 August 25, 2010 Updated: August 27, 2010 Market Overview: Fraud Management Solutions Seven Tenets Of Effectively Combating Fraud Costs by Andras Cser with Stephanie Balaouras and Lindsey Coit Executive Summary Fraud causes companies to lose money in many ways: They face losses due to chargebacks, unrecoverable transfers, and unnecessary shipping costs; and spend extensive time and resources investigating many transactions. Fraud can impact a company s goodwill. With fraud rings expanding operations beyond the online channel to ATM, POS, branch, and call center, financial services and other organizations need effective ways to protect against cross-channel fraud. Forrester s interviews with IT end users highlighted the following tenets as being important in fraud management products: 1) Use a statistical, vertical model to assess risk scores; 2) use rules to respond to emerging threats; 3) monitor transactions and entities across channels; 4) interdict near real time; 5) use entity and link analytics to see how fraud rings operate; 6) integrate disparate fraud management systems case-management interfaces in order to navigate between fraud cases and cross line of business boundaries; and 7) integrate with adaptive authentication s monitoring of the login context. We looked at how vendors satisfy these tenets and also provide detailed information on vendors market presence. table of Contents 2 Fraud Is Eating Your Revenue And Profits 2 How Fraud Management Solutions Prevent Fraud 4 The Seven Tenets Of Effectively Combating Fraud Cost 7 Fraud Management Grows To A $1.3B Market In Fraud Vendors Cater To Diverse Verticals 14 Traditional Market Area Boundaries Blur In Fraud Management recommendations 17 Move Beyond Rules And Transactions For Core Applications 18 Supplemental Material NOTES & RESOURCES Forrester interviewed 12 vendor and 15 user companies: 41st Parameter, Accertify, Actimize, Arcot, CyberSource, FICO, Fiserv, Intellinx, Memento, Norkom, Oracle, and SAS. Related Research Documents Case Study On Fraud Management: An eretailer Reduces Order Reviews By 83% April 9, 2010 Shift Happened In The Strong Authentication Market In 2009 February 1, , Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To purchase reprints of this document, please clientsupport@forrester.com. For additional information, go to

3 2 Market Overview: Fraud Management Solutions fraud is eating your revenue and profits Fraud is a significant problem at enterprises during good times and bad. Based on IT client and vendor reference conversations, Forrester estimates that financial services companies lose about 5% to 8% of revenue to fraud each year, and the Merchant Risk Council estimates that online merchants lose 1.4% of annual revenues to fraud. Not surprisingly, companies have dedicated significant internal resources to combating fraud. Typically, a department reporting to a chief risk officer or chief compliance officer owns fraud management. Some larger organizations have entire departments dedicated to fraud management. Forrester has also seen the chief information security officer (CISO) or a department reporting to the CTO owning fraud management. Regardless of which organization ultimately owns fraud management, finding cost-effective ways to combat fraud is critical to protecting profits and staying competitive. And as fraud becomes increasingly more sophisticated, risk professionals will need to turn to increasingly more sophisticated and automated solutions. Since fraud is committed more and more by fraud rings that quickly attack your business from various channels (Web, call center, branch, ATM, POS, etc.), you will have to protect your business from fraud by moving beyond transactions to entities, looking across multiple channels in near real time. HOW Fraud Management Solutions prevent fraud Fraud management solutions allow you to identify potential fraudulent transactions based on suspicious activities or patterns (see Figure 1). For example: opening a joint account on an existing checking account, changing the home address of the account holder, ordering new checks, and then writing checks to deposit funds from the original account to the new joint account is a set of suspicious activities. Similarly, enrolling in online banking, changing the customer profile (phone number, address, mailing address) online, ordering a new debit card, transferring all funds to demand deposit account (DDA) or checking account, then draining the account with a new debit card are also fraudulent patterns of transactions. Obviously, with the increase of fraud, new patterns continuously emerge in this cat and mouse game. Reliably identifying suspicious transactions and entities (persons, phone numbers, home addresses, addresses, computers, mobile phones, and other devices) associated with transactions at an acceptable speed are key to detecting, managing, and reducing fraud. Traditionally, fraud management solutions have been split into adaptive and risk-based fraud management (which covers the authentication context) and enterprise fraud management (which includes the application specific, cross-channel model); however, Forrester client interviews reveal that unifying these two areas is increasingly important in formulating an effective fraud management strategy. Tracking the login context fraud is essential to managing subsequent potentially fraudulent activity in sessions. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

4 Market Overview: Fraud Management Solutions 3 Figure 1 Anatomy Of Fraud Management Solutions IP address Device identity Authentication (login) Context data 4. Real-time transaction data Fraud information network 1. Statistical risk model POSITIVES Outsourced transactions Really fraudulent transactions (true positives) Nonfraudulent transactions (false positives) End user Session speed Time of day Batch-based transaction data 2. Rulesbased model 5. Entity analytics Uncaught fraud (false negatives) User identity Training data NEGATIVES Nonoutsourced transactions Nonfraudulent transactions (true negatives) 7. Context-based, adaptive, and risk-based authentication 3. Cross-channel data and applications Model 6. Case management Model administrator Fraud analyst Source: Forrester Research, Inc. 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

5 4 Market Overview: Fraud Management Solutions The Seven Tenets of effectively combating Fraud costs In conversations with financial services, airlines, online retailers, healthcare, and telecommunications companies, Forrester identified seven tenets of fraud management that play a key role in detecting, managing, and preventing fraud economically. They are: 1. Statistical Risk Models Identify Fraud More Quickly And Accurately Statistical models in fraud management work similarly to spam models. They predict how likely certain entities (phone number, person s name, mailing address, etc.) are likely to be tied to fraudulent transactions. Spam filters work much the same way they predict how likely a message is spam based on the occurrence of certain words in the message like online pharmacy, satellite dish receiver, etc. Statistical models are vertical-specific, usually provided and updated annually by the vendor of the solution. Most vendors provide a statistical model, with certain outputs that fraud analysts can channel into a rules-based afterburner for handling tactical and company-specific fraud issues. Statistical models also have a benefit of reducing the need for rules in general and selflearning. Forrester estimates that statistical models also have the benefit of performing about 30% to 35% faster at the same false positive rate. 2. Rules-Based Risk Models Adapt Quickly To Changing Fraud Threats Statistical models are great from a performance perspective, but they cannot always adequately respond to new or broad-based fraud threats. 1 Vendors need to update or tune the model to account for these types of threats. In our interviews, customers across all verticals indicated that solutions with purely analytical, black box, and closed models drift quickly in their effectiveness (which is also hard to detect) and generally speaking, it is neither easy nor quick to add new features to them. Because of this, fraud analysts should funnel the risk score output from the statistical model into a rules-based model that then further refines the risk score to meet the tactical requirements of the company. It is also important to be able to control the overgrowth of the rules: Excessive rules cause performance problems and are costly to maintain and debug. 3. Cross-Channel Intelligence Shoots Down Fraudsters Everywhere Companies offer their customers and partners the convenience of doing business with them across multiple channels. These channels include online/web, telephone/call center, branch or store, point of sale (POS debit and credit card signature and PIN transactions, card not present [CNP]), ATM, and employees. Organizations are generally well equipped to detect fraud that happens through one channel. Imagine that a fraudster compromises a victim s ID and password and uses online banking to change the victim s address, opens a new joint account, transfers all funds from the checking account to the new joint account, and then finally makes an online payment to a newly added fraudulent payee. This seemingly complex fraud transaction is actually easy for a fraud analyst or fraud management solution to detect because it all occurs through one channel online banking. Organizations are often poorly prepared to detect fraud that is composed of seemingly harmless transactions when the fraud occurs across multiple channels. Now imagine that the same August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

6 Market Overview: Fraud Management Solutions 5 fraudster signs up for online banking on the phone, then changes the victim s mailing address online, orders new ATM cards online, resets the PIN online, and uses the ATM card to make a fraudulent withdrawal from the victim s account. To defend against cross-channel fraud effectively, fraud management solutions must: 1) support multiple data and transaction types (e.g., wire transfer, deposit, ACH, bill payment, orders, etc.); 2) collect information from all relevant channels; 3) analyze each channel; and 4) correlate the analysis results across multiple channels to formulate a risk score. 4. Near Real-Time Performance Stops Fraud Before It Happens The ability to prevent fraudulent transactions before they cause financial harm (chargebacks, etc.) is ideal. Therefore, a fraud management solution that provides real-time processing and analysis is a key requirement. There are a few use cases when near real-time analysis is not a strict requirement (for example, at an eretailer, you may have 6 hours to sort through laptop orders before they need to be shipped at the end of the day), but otherwise, you should strive to stop or limit online fraud transactions as early as possible. It s important that you find the right balance for your company. You want the fraud management solution to return a decision about a transaction quickly (typically under a second), but you also want to be sure that you re not hampering the ability of users to conduct legitimate online transactions by blocking their transactions unnecessarily. For some transactions that are not processed in real time, such as bill pay, it may be OK to process this later in a batch. 5. Entity And Link Analytics Elevates Point Of View Above Transactions If you only look at fraud scores at the transaction level, you will almost certainly miss those situations when certain entities (i.e., computers, mobile phones, phone numbers, or mailing addresses) are linked to several known fraudulent transactions. To highlight the relationships forming fraud rings, the product should support entity and link analytics. Entity and link analytics is usually a dynamically changing, time-based, visual diagram of how entities link to each other in transactions. Oftentimes a thicker line between entity nodes indicates multiple relationships between those entities a warning sign of higher fraud risk. To help fraud analysts quickly focus on fraud, they can rotate the graph, zoom into it, filter on entities, etc. Many vendors will allow fraud network integration with their solution to allow clients to tap into white lists and blacklists based on information gathered securely from other similar client organizations (see Figure 2). 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

7 6 Market Overview: Fraud Management Solutions Figure 2 Example Of Entity And Link Analytics In Action Source: SAS Source: Forrester Research, Inc. 6. Unified And Integrated Case Management Reduces Personnel Costs Today, all lines of business (LOB) use their own fraud solution with its own case management system. Most case management systems provide fraud analysts with a Web-based user interface where they can inspect, quarantine, manage, release, and report on transactions sorted out by the solution s analytical and rules-based engine based on risk score. Banks, however, typically use several vendors solutions across their business units (wholesale, retail, lending, etc.), making correlation of cases a manual, error-prone, and lengthy process. Forrester sees many financial services, eretailer, and transportation companies attempting to create at least a unified view of or reporting of cases. In order to accomplish this, the case management system must support calls from Web services. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

8 Market Overview: Fraud Management Solutions 7 7. Context Sensitivity Monitors The Entire Transaction Stack For Fraud To provide context sensitivity, the fraud management solution should look at the entire transaction path. This includes the login and authentication context (IP address and geographical location and change of IP address of the machine, device fingerprint, time and day of login, session click-through speed, etc.). It also includes integration with identity and access management solutions (Web single sign-on, multifactor authentication, out of band and strong authentication, user account provisioning, etc.) for supporting Web and other login, enrollment, identity vetting and proofing services. Fraud MAnagement grows to a $1.3B market in 2009 Given the requirements described above, coupled with the fact that vendors no longer cater to a pure vertical market, Forrester sees Web fraud management (including device identification) and traditional financial services and nonfinancial services fraud management sectors converging (see Figure 3-1). Forrester currently estimates the total market at approximately $1.3 billion (see Figure 3-2). Given the convergence, the continued demand for this offering, together with vendor historical growth, Forrester estimates the compound year over year annual growth of the market in 2009 at 25%. 2 Financial services enterprise fraud management products typically have their own statistical and rules-based models that are specifically targeted at the financial services (banking and insurance) verticals. These products focus on transactions analysis across a wide range of channels, such as Web, POS/ATM, branch, call center, and employees. Nonfinancial services fraud management products usually have a rules-based fraud prevention engine and are targeted toward eretail, travel, healthcare, and services industries. These products focus largely on the Web and the call center channels. Web fraud management and device identification vendors are used across all verticals and focus almost exclusively on the Web channel. They often bundle device identification capabilities to generate risk scores based on the authentication context and integrate with multifactor authentication (knowledge-based authentication, one type password, etc.) mechanisms. 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

9 8 Market Overview: Fraud Management Solutions Figure 3 Fraud Management Market And Market Shares 3-1 Consolidation of fraud management markets Financial services enterprise fraud management Nonfinancial services fraud management Web fraud management and device identification 3-2 Fraud management market size and forecast Forrester s fraud management 2009 license and hosting revenue estimates, excluding services (US$ millions) Enterprise fraud management (finanical services) Web fraud and device identification Oracle (Mantas) 4% Norkom 2% Others 34% SAS 2% Memento 2% Intellinx 1% Actimize 13% ACI 4% Fiserv 25% Total market: $789 Total known vendors: $521 FICO 13% 41st Parameter 3% Others 50% ThreatMetrix <1% Enterprise fraud management (nonfinancial services) Accertify 11% Arcot 5% RSA 28% Total market: $360 Total known vendors: $180 iovation 3% Entrust 7% Oracle (OAAM) 4% Others 40% CyberSource 31% Retail Decisions 18% Total market: $95 Total known vendors: $57 Source: Forrester Research, Inc. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

10 Market Overview: Fraud Management Solutions 9 FRaud Vendors cater to Diverse verticals Forrester interviewed 12 enterprise fraud management (EFM) vendors for this report. Each of the vendors that participated in this research responded to a detailed Forrester questionnaire and provided customer references. Readers should be aware that ACI did not respond to Forrester s invitation to participate in this research, and Entrust and RSA declined Forrester s invitation to participate in this research. Because we could not obtain detailed information or customer references from these vendors, we could not fully feature them in the report. Readers should also be aware that some EFM vendors participating in the report provide true, 100% real-time capabilities, while other vendors offer near real time-responses (up to 30 seconds). Vendors With A Focus On Financial Services Today, these vendors focus almost exclusively on financial services. Most vendors expressed interest in expanding their solutions to other verticals such as healthcare, travel industry, and services: Actimize is an established player in account origination and payments. Focusing on the Web, mobile, and phone/kiosk channels with a combination of Bayesian statistical and rules-based fraud risk model, Actimize is a leading player in the EFM marketplace. It can provide real-time responses to all transactions it monitors. While the current link analytics interface is mainly textual, with the technology it gained through the Syfact acquisition, Actimize is developing a graphical link analysis interface. Customers we interviewed have generally been satisfied with the case management interface. The queue performance overview dashboard conveniently highlights false positive rates and savings for each transaction type. Actimize provides its own device-fingerprinting module and has an integration partnership with Corillian for Web-based challenge questions and with Authentify for out-of-band Web-based authentication. ACI protects against several fraud types: payment card, wire transfer, deposit, and employee. ACI is one of the largest companies in the EFM space, and its link analytics capabilities elevate the product above the competition. Some customers expressed concerns with clumsiness of the case management user interface. In addition, its model is considered largely black box; tuning of the model can be challenging to a customer s fraud analyst resources. FICO (Fair Isaac) specializes in credit, debit card, and ACH transactions. Another EFM specialist in financial services, the company s pedigree is a neural network-based, cross-channel modular model. With Falcon 6, the application also provides adaptive analytic scores. These scores are updated in real time based on analyst dispositions of fraud and not fraud. These scores are provided in addition to the supervised neural network scores on each transaction that is processed through the scoring engine/model. Today the company provides more than 100 different neural network models for different use cases. Adding new, emerging features (e.g., a merchant ZIP code) to the neural network can require retraining or addition of customerwritten rules. By using Falcon with its neural network-based analytics and the rule engine, customers were able to reduce fraud-related loss from 0.18% to 0.06% of revenue. 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

11 10 Market Overview: Fraud Management Solutions Fiserv protects bill payment, payment card, and check fraud transactions. Fiserv is one of the largest players in the fraud space and offers its products primarily to financial services, insurance, retail, and government verticals with a focus on financial crime risk management. Fiserv s financial crime risk management platform comprises three main elements. Fraud Risk Manager and AML Manager are used for fraud prevention, anti-money laundering, trade surveillance, and employee fraud protection. FraudLink provides check, deposit, kiting, and ACH (echeck) fraud mitigation. FraudGuard provides digital check imaging protection against forgery, counterfeits, and alterations. Fiserv does not disclose how its statistical model is updated and trained; the solution uses behavioral profiling, peer group analysis to complement rules. Fiserv also has image-based analysis capabilities, device fingerprinting, and entity analytics. Intellinx shines in employee fraud management and prevention. Intellinx focuses on the financial services, insurance, government, and healthcare verticals. According to the Association of Certified Fraud Examiners (ACFE) 2008 survey, 60% of all fraud involves employees in some capacity, and the median cost of an employee fraud is $175, Although it is marketed also as a cross-channel EFM solution and has customers utilizing this feature, Intellinx focuses on employee fraud and uses a real-time, agentless collection mechanism to snoop the corporate network. Fraud analysts can view a replay of user screen activity, define data as facts, entities, and measures. Facts, measures, and conditions can trigger rules in policies, and each rule can have actions or an associated workflow. Analysts can define entities (names, mailing addresses, phone numbers, addresses, etc.) in the product and visually represent all entities in the link analytics window. The case management in the product is Web-based, while the policy and rule design are thick client this can be a hindrance for large organizations where many analysts need to define policies simultaneously. While Intellinx does not currently have a predictive statistical model, it is on the firm s development road map for Memento looks primarily at employee fraud, ACH, wire, and check/deposit/kiting. Memento aggregates information from multiple sources into a proprietary, consolidated data cache and analyzes the data cache to identify fraudulent activity. Memento does not disclose the mathematical model for its statistical risk engine, but Forrester surmises that it uses a Bayesian model or other models depending on the type of fraud. Memento s reports indicate the relative success and efficiency of rules, thus enabling fraud analysts to add parameters or alter or retire rules as appropriate. Memento incorporates a leading complex event processing engine for real-time data analysis, which allows fraud analysts to perform analysis of the data in flight. Memento uses IBM s Global Name Recognition software to identify common names, even though they may be orthographically different. The product presents a network diagram for proactive link analysis. The solution publishes alerts into the product s case management system where analysts can perform workflow-based alerts triage, reporting, and forensic investigation. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

12 Market Overview: Fraud Management Solutions 11 Norkom offers a solution for check deposits, cash, and ATM/POS/CNP transactions. Norkom s Multi-Channel Fraud Management Solution provides cross-channel customer/ account profiling and uses predictive analytics to detect fraud across channels. It aggregates alerts across channels and integrates with non-norkom detection engines. Norkom s solution uses profile groups, which allows easy comparison between behaviors of the same peer group (e.g., online Web banking customers). Norkom provides a unique rule induction engine to automatically suggest and create rules based on current trends. The solution can receive and interdict real-time transactions inside the Norkom detection engine s loop. Norkom provides a visual Link Analysis application which, in conjunction with the Link Analysis engine, is capable of making connections based on arbitrary user-defined criteria (e.g., transactional relationship, geographical relationship, IP address, etc.). Case management alerts are displayed in Norkom s Enterprise Investigation Management application. Alert information is integrated with customer, account, employee, transaction, and event information to provide a complete picture of behavior across products and channels. Norkom can ingest alerts from multiple detection engines, including existing bank proprietary systems, as well as other off-the-shelf detection engines. SAS evolves from compliance to EFM. For more than 20 years, SAS has provided solutions for anti-money laundering and know your customer compliance requirements. It has used this accumulated expertise to build an EFM platform. Today, customers use SAS s EFM solution with card fraud, employee fraud, ACH, wire, check, cash, and account opening on real-time, POS, online, ATM, branch, and call center channels. Forrester customer references report that they use a combination of the SAS EFM platform and in-house SAS programs to provide a highly customized fraud management solution. SAS uses its data warehouse platform to collect data from all customer products, channels, and lines of business to monitor transactions, accounts, and customers for patterns of suspicious behavior. The system supports the generation of alerts for fraud investigation for suspicious transactions. SAS provides a hybrid modeling approach including Bayesian, neural network, and logistical regression methods to perform risk analytics that fraud analysts can recursively apply at multiple levels. The SAS solution has a relatively high 1-to-1 services-to-licenses cost ratio which can mean higher than usual cost for clients. To offset this, SAS introduced pricing based also on the size of the institution. The SAS link analytics has a time scale that allows the fraud analyst to see how the fraud ring evolved with time. The solution uses its own device identification modules. Vendors With A Vertical Focus On Industries Other Than Financial Services These vendors focus on transportation, services, retail, telecommunications, and ecommerce. Forrester s interviews revealed that these vendors are planning to provide solutions for the midsize and small banks segment of the market as well. Accertify prevents fraud with payments, eretailer orders, chargebacks, refunds, and returns. With a pedigree of supporting online travel agencies (the solution is based on the Orbitz fraud prevention system), Accertify focuses on Web, phone, and POS channels and provides services 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

13 12 Market Overview: Fraud Management Solutions to ecommerce merchants, airlines, and services companies to prevent fraud. The solution allows submission of information from multiple channels. It also provides the ability to set security, reporting, and access settings, as well as the parameters that drive rules execution, screen display, queuing, filtering, sorting, transaction resolution, and reporting. The solution supports real-time integration via HTTPS, including synchronous/asynchronous response, but can also act in batch or hybrid modes based on requirements. The solution is rules-based, and the vendor does provide a set of starting rules that clients can use as a basis to build out their own rule set. The solution does not have its own statistical model but can call out to other models for statistical modeling. The solution has extensive integration with more than 20 service providers, including iovation, Experian, TARGUSinfo, Lexis NexisAccurint, ID insight, and ThreatMetrix. It integrates with the RapLeaf solution for checking addresses across social networking sites like Facebook, Flickr, and Plaxo. CyberSource protects card, ACH, PayPal, and bank transfers for retail, travel, and media. CyberSource offers statistical/analytical models for geographies (US, Canada, rest of the world) and offers custom risk models for the verticals it serves; its hosted-only solutions provide transactional linking. Transactional linking compares the characteristics of the current transaction with all past transactions recursively. Information codes are returned indicating linkages/data correlations. Its Decision Manager processes transactions in real time, applies dynamically weighted, customer-created rules to determine transaction risk scores in near real time (about 2 seconds). The product s case management does not provide alerts but has review and reject queues. It integrates with 192.com, Accurint, Telcordia, Quova, SAP, Attus, ThreatMetrix, Spaatmarker, and TARGUSinfo and has an open API for integration. Vendors That Provide Web Fraud And Device Identification Forrester clients often ask about Web fraud and device identification solutions, as catching fraud early on the Web channel is the best protection and prevention against frauds in almost any other vertical. Forrester repeatedly gets asked by utility and higher education companies on how they can improve the strength of their Web-based systems authentication without imposing inconvenient multifactor authentication devices on their users: 41st Parameter uses its pedigree device identification to a fraud management solution. 41st Parameter protects account origination (credit and debit cards and checking accounts), detects account takeover, authentication, and wire transactions and is most active on Web, mobile device, and phone/kiosk channels. The solution does not have a statistical model. In its nonbehavioral, rules-based risk engine, it tracks individual rule hits as well as overall system performance in terms of fraud detection and false positive rates. The solution leverages the flexibility of tunable thresholds, actions, and scores for each rule, with full control provided to the risk management group via user interface. It also provides scores for velocities, geographical inconsistencies, suspicious configurations, time and time zone inconsistencies, hits on negative lists, and online form-filling behavior. For risk-based authentication, results are in real time. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

14 Market Overview: Fraud Management Solutions 13 For account opening, takeover, and transactions, the solution processes them in near real time (about 30 to 90 seconds). With Web services, the solution can take real-time feeds, but responses are near real-time. Data Spider and Sketch Match tools perform link analysis and evaluate a match on any field it risks against, including device prints. Some clients mentioned that because of inefficient architectural design, they had problems reaching the desired performance with the product to meet high performance requirements and initially had to use too much processing hardware to run the 41st Parameter risk engine for a simple deployment with high authentication volumes. Arcot approaches fraud management with Web-based, adaptive authentication. The product protects Web- and phone-based home banking and other portals in financial services, biotech, and other verticals. It employs an open and tunable statistical model based on multivariate regression analysis to determine which features contribute to fraud. Fraud analysts can build rules using any element those available in the session and those that are passed by an application. The product labels each element fraud analysts write rules using labels instantiated for each transaction. Fraud analysts can define new rules. Arcot plans to add rule conflict detection, listing of rules for a variable, and a rule overgrowth analyzer. For crosschannel analysis, the product maps aliases for each user and aggregates activities across multiple channels, while rules and predictive models look for anomalies across channels. The solution offers all functionality in real time only rule/model setup and validation is performed offline. The product today has no graphical interface for entity analytics. For link analysis, Arcot builds profiles based on devices, IP, users, and beneficiaries (merchant, ACH recipient). The product then uses these risk profiles to fine-tune the risk factors on specific transactions. Although there is a way to quarantine transactions, fraud analysts will use alerts to manage potential fraud. The product displays alerts in a Case Management console and prioritizes them using a configurable criteria set. Analysts can view the alert, click on it to view details and related cases, before taking action on the case. The product offers integration with one-time text messages with one-time passwords. It integrates with CA SiteMinder, IBM TAM, Oracle Access Manager, Novell Sun Access Manager, and Idology Identity Proofing. It also integrates with VPN vendors, including Cisco, Check Point, Juniper, and others. Oracle Adaptive Access Manager offers integration with identity and access management. Protecting wire transfer, credit card, and POS transactions mainly on Web and mobile applications, Oracle Adaptive Access Manager (OAAM) is an in-line, real-time solution with roots in Web fraud detection and adaptive access management. OAAM, in its current release, does not rely on statistical models but profiles actual user behavior in real time using a form of bucketing. Oracle plans to offer a predictive, statistical model based on Oracle Data Mining s statistical models algorithms (such as Logistic Regression, Naive Bayes, Support Vector Machines, Enhanced K-means, and Apriori). The product does not provide a way to avoid rule overgrowth but it is scalable and can support near real-time risk score generation and interdiction, subsecond response with a large number of rules. The product does not offer a 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

15 14 Market Overview: Fraud Management Solutions visual link analysis tool but has identity resolution capabilities based on behavioral similarities (Bill and William have an identical user behavior profile, including the IP address and device fingerprint they use, locations they access from, times of day they access, etc.). The solution supports integration with Oracle Access Manager and Oracle Entitlements Server and Oracle Identity Manager for dynamic knowledge-based authentication. Traditional Market AREA Boundaries BLUR in Fraud Management As users have begun to recognize the importance of integrating fraud management capabilities from various verticals and customers segment across multiple channels, traditional product categories such as enterprise fraud management, adaptive authentication, device identification, and Web SSO will blur rapidly (see Figure 4). Forrester expects that vendors today anchored in a specific vertical (financial services or travel) will penetrate other verticals with novel offerings and aggressive pricing. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

16 Market Overview: Fraud Management Solutions 15 Figure 4 EFM Market Insight A spreadsheet with additional data is available online. Question/ description Solution s name Vendor 41st Parameter Accertify Actimize FraudNet with DeviceInsight clientless device intelligence (CDI) technology Interceptas InterceptNOW InterceptSHARE Remote Banking Fraud Employee Fraud Card Fraud Deposit Fraud Wire & ACH Fraud Employee Trading Fraud Enterprise Risk Case Manager Top three channels Top three transaction types Solution offering (license, subscription on-premise, or subscription hosted) Top three most successful-selling verticals Web, mobile, phone/kiosk Account origination (card, DDA), authentication, and transactions/wires Subscription on-premise and subscription-hosted Financial services, travel, retail ecommerce (50% of revenues) Web, phone, POS Payments, orders, chargebacks Subscription-hosted Retail ecommerce/ electronics, travel and entertainment, event ticketing ATM, POS, Web PIN debit, signature debit and credit, interbank transfers Both license and subscription on-premise deployment, as well as a subscription-hosted option Banking, brokerage, technology/processors/ service providers to the financial services market Solution s name Arcot RiskFort Fraud Detection and risk-based authentication CyberSource CyberSource Decision Manager FICO FICO Falcon Fraud Manager FICO Fraud Predictor with Merchant Profiles FICO Card Alert Service Top three channels Top three transaction types Solution offering (license, subscription on-premise, or subscription hosted) Top three most successful-selling verticals Web, phone, mobile Card (credit/debit), portal access, and admin activity Subscription-hosted and subscription on-premise Financial services, biotech Web, phone, IP-based txn channels Credit/debit card, ACH, PayPal Subscription-hosted Media/ entertainment/ telecom, retail, travel POS/ATM, Web, phone Credit auth transaction, debit auth transaction, ACH Recurring license and maintenance on-premise or hosted at a partner environment or payment processor Financial services, insurance, retail, government Source: Forrester Research, Inc. 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

17 16 Market Overview: Fraud Management Solutions Figure 4 EFM Market Insight (Cont.) Question/ description Fiserv Vendor Intellinx Memento Solution s name Financial Crime Risk Management Intellinx Memento Security Top three channels Top three transaction types Retail banking, wholesale banking, private banking Bill payments, credit card, check fraud Branch, Web, phone Employee fraud, cash, check POS, Web, branch Employee fraud, ACH and wire, check Solution offering (license, subscription on-premise, or subscription hosted) Top three most successful-selling verticals License, subscription on-premise, subscription hosted, SaaS Banking, insurance, and pre-pay card Licensed with annual maintenance Retail banking, insurance, government Typically three-year-term license, on-premise. Retail banking, credit card issuers, healthcare Solution s name Norkom Technologies Oracle SAS Norkom Multi Channel Fraud Management Oracle Adaptive Access Manager SAS Fraud and Financial Crimes Framework (FF) SAS Anti-Money Laundering (AML) SAS Social Network Analysis (SNA) SAS Fraud Management (Real-Time) SAS Enterprise Case Management (ECM) Top three channels Top three transaction types Solution offering (license, subscription on-premise, or subscription hosted) Top three most successful-selling verticals ATM, POS/CNP, Web Card transactions, checks/ deposits, cash transactions Licensed on-premise solution, subscription-hosted Banking, insurance, capital markets firms Web and mobile, POS, phone Wire transfer, credit card, self-service password reset Licensed on-premise or subscription based hosted at partner (BT) Financial services, healthcare, government POS, Web, ATM Card transactions, employee fraud, ACH Licensed on-premise, subscription-hosted Financial services, insurance, government Source: Forrester Research, Inc. August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

18 Market Overview: Fraud Management Solutions 17 Recommendations Move beyond rules and Transactions for core applications As a result of fraud rapidly becoming more sophisticated, Forrester sees definite convergence trends in the fraud management market vendors recognize that a versatile and well-rounded solution requires not only generating and examining risk scores in their comfort-zone verticals and channels but also reaching out to areas in which they have not yet had products. As you begin to develop your enterprise fraud management strategy, Forrester makes these recommendations: Start with device identification and grow into other areas of fraud. Device identification provides a great way to begin finding out which devices, phone numbers, mailing addresses, and people are involved with fraudulent transactions. These solutions allow you to monitor traffic and transactions, identify patterns, and perform a manual setup of rules to identify fraud as needed. It s not enough to combat today s ever-changing, multi-channel fraud transactions, but it s a great place to start building knowledge and expertise. Don t impact the performance of legitimate users transactions in your quest to stop fraud. You can set up special rules or handling for new users transactions that will minimally impact their user experience. It s very important to balance the cost of fraud detection with the cost of losing legitimate customers. Using products with statistical models in fraud detection not only allows for faster detection (typically) at the same false positive rate as other solutions but also enables your organization to adaptively monitor fraud based on emerging patterns. Think of interactive link analytics as a must-have. Looking at a dynamically changing network diagram is a lot more beneficial for a fraud analyst than peering over tabular reports. Fraudsters and their methods change dynamically, and you need to be able to at least follow them. Pay attention to features such as time machines for link analysis and identity resolution. The ability to consolidate or collapse nodes in the link network graph is very important in improving accuracy and reducing the cost of fraud detection. Integrate with identity and access management. Products in this space have not traditionally integrated with identity administration, user account provisioning, and Web single sign-on products. Forrester s interviewees clearly expressed the need for the fraud department to own security and fraud management of at least the Web transaction channel as much as possible. Coordinating Web identity vetting, registration, single sign-on, adaptive authentication, and backend transactional monitoring and fraud prevention models and rules is key. 2010, Forrester Research, Inc. Reproduction Prohibited August 25, 2010 Updated: August 27, 2010

19 18 Market Overview: Fraud Management Solutions Supplemental Material Methodology Forrester interviewed 12 vendors and 15 customers for this report. Forrester identified leading vendors in enterprise fraud management based on client inquiries, client consulting engagements, vendor briefings, and secondary research. Invited vendors were then asked to complete a detailed questionnaire and provide three customer references. Endnotes 1 Forrester expects that deterministic fraud (such as insider fraud) management and AML, KYC, and compliance is suited better for rules-based and deterministic models. 2 Forrester s market growth estimate is based on vendors revenue growth rate average, based on IT client inquiries. 3 Source: 2008 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners ( August 25, 2010 Updated: August 27, , Forrester Research, Inc. Reproduction Prohibited

20 Making Leaders Successful Every Day Headquarters Forrester Research, Inc. 400 Technology Square Cambridge, MA USA Tel: Fax: Nasdaq symbol: FORR Research and Sales Offices Forrester has research centers and sales offices in more than 27 cities internationally, including Amsterdam; Cambridge, Mass.; Dallas; Dubai; Foster City, Calif.; Frankfurt; London; Madrid; Sydney; Tel Aviv; and Toronto. For a complete list of worldwide locations visit For information on hard-copy or electronic reprints, please contact Client Support at , , or clientsupport@forrester.com. We offer quantity discounts and special pricing for academic and nonprofit institutions. Forrester Research, Inc. (Nasdaq: FORR) is an independent research company that provides pragmatic and forwardthinking advice to global leaders in business and technology. Forrester works with professionals in 19 key roles at major companies providing proprietary research, customer insight, consulting, events, and peer-to-peer executive programs. For more than 27 years, Forrester has been making IT, marketing, and technology industry leaders successful every day. For more information, visit

February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q1 2012

February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q1 2012 February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q1 2012 by Andras Cser and Eve Maler for Security & Risk Professionals Making Leaders Successful Every Day February

More information

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,

More information

CA Arcot RiskFort. Overview. Benefits

CA Arcot RiskFort. Overview. Benefits PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud

More information

For Infrastructure & Operations Professionals

For Infrastructure & Operations Professionals Case Study: AMERICAN SYSTEMS Demonstrates The Value Of Business Service Management From Reactive To Proactive: Using Service Management To Leverage Integrated Event Correlation Executive Summary by Evelyn

More information

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals NetQoS Offers An Experience Monitoring Solution For Global Performance Management The Forrester Wave Vendor Summary, Q2 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D., and Reedwan Iqbal EXECUTIVE

More information

October 27, 2009 Case Study: ING Delivers Personalized Product Offers Across Channels In Real Time

October 27, 2009 Case Study: ING Delivers Personalized Product Offers Across Channels In Real Time October 27, 2009 Case Study: ING Delivers Personalized Product Offers Across Channels In Real Time by Alexander Hesse for Customer Intelligence Professionals Making Leaders Successful Every Day October

More information

FICO Falcon Fraud Manager for Retail Banking

FICO Falcon Fraud Manager for Retail Banking FICO Falcon Fraud Manager for Retail Banking What can you do to protect the current account against fraud attacks? Martin Warwick Principal Consultant Fraud Solutions FICO May 2010 1 2010 Fair Isaac Corporation.

More information

Enterprise Fraud Management: Still Evolving After All These Years

Enterprise Fraud Management: Still Evolving After All These Years Enterprise Fraud Management: Still Evolving After All These Years THIS DOCUMENT IS AN EXCERPT OF A TWENTY-FIVE PAGE INDEPENDENT RESEARCH REPORT PUBLISHED BY AITE GROUP IN MAY 2014. PROVIDED COMPLIMENTARY

More information

I&O Execs: It's Time To Rediscover BSM 2011

I&O Execs: It's Time To Rediscover BSM 2011 May 13, 2011 I&O Execs: It's Time To Rediscover BSM 2011 by Jean-Pierre Garbani with Robert Whiteley and Alex Crumb for IT Operations Professionals Making Leaders Successful Every Day For Infrastructure

More information

September 27, 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007

September 27, 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D. and Reedwan Iqbal EXECUTIVE

More information

ACI Response to FFIEC Guidance

ACI Response to FFIEC Guidance ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention

More information

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2

More information

SAS Fraud Framework for Banking

SAS Fraud Framework for Banking SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction

More information

Modern Payment Fraud Prevention at Big Data Scale

Modern Payment Fraud Prevention at Big Data Scale This whitepaper discusses Feedzai s machine learning and behavioral profiling capabilities for payment fraud prevention. These capabilities allow modern fraud systems to move from broad segment-based scoring

More information

The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015

The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015 For: Marketing Leadership Professionals The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015 by Xiaofeng Wang, January 27, 2015 Key Takeaways OgilvyOne, Isobar, And Razorfish

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day January 27, 2012 The Forrester Wave : US Digital Agencies Mobile Marketing Strategy And Execution, Q1 2012 by Melissa Parrish for Interactive Marketing Professionals Making Leaders Successful Every Day

More information

Modern Payment Fraud Prevention at Big Data Scale

Modern Payment Fraud Prevention at Big Data Scale This whitepaper discusses Feedzai s machine learning and behavioral profiling capabilities for payment fraud prevention. These capabilities allow modern fraud systems to move from broad segment-based scoring

More information

December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009

December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009 December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009 by Carlton A. Doty and Julie M. Katz for Interactive Marketing Professionals Making Leaders Successful Every Day Includes

More information

SECURING IDENTITIES IN CONSUMER PORTALS

SECURING IDENTITIES IN CONSUMER PORTALS SECURING IDENTITIES IN CONSUMER PORTALS Solution Brief THE CHALLENGE IN SECURING CONSUMER PORTALS TODAY The Bilateral Pull between Security and User Experience As the world becomes increasingly digital,

More information

Fraud Solution for Financial Services

Fraud Solution for Financial Services Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial

More information

July 26, 2011 Updated: July 28, 2011 Are Events Dead? Not If You re A Tech Buyer by Kim Celestre for Technology Marketing Professionals

July 26, 2011 Updated: July 28, 2011 Are Events Dead? Not If You re A Tech Buyer by Kim Celestre for Technology Marketing Professionals July 26, 2011 Updated: July 28, 2011 Are Events Dead? Not If You re A Tech Buyer by Kim Celestre for Technology Marketing Professionals Making Leaders Successful Every Day July 26, 2011 Updated: July 28,

More information

How the Past Changes the Future of Fraud

How the Past Changes the Future of Fraud How the Past Changes the Future of Fraud Addressing payment card fraud with models that evaluate multiple risk dimensions through intelligence Card fraud costs the U.S. card payments industry an estimated

More information

August 24, 2007 Are You Ready For Unified Communications?

August 24, 2007 Are You Ready For Unified Communications? August 24, 2007 Are You Ready For Unified Communications? by Elizabeth Herrell for Infrastructure & Operations Professionals Making Leaders Successful Every Day For IT Infrastructure & Operations Professionals

More information

For ebusiness & Channel Strategy Professionals

For ebusiness & Channel Strategy Professionals Retailers Plan To Expand Online Customer Service Channels In 2010 But Disconnection Between Customer Service And Brand May Spell Trouble by Diane Clarkson with Carrie Johnson, Elizabeth Stark, and Kate

More information

FICO Enterprise Fraud and Security Management. > Protection with a holistic view.

FICO Enterprise Fraud and Security Management. > Protection with a holistic view. FICO Enterprise Fraud and Security Management > Protection with a holistic view. > Fraud is everywhere. It s pervasive, invasive and harms customers, merchants and institutions alike. How can you keep

More information

Manage Risk And Fraud Across The Entire Customer Lifecycle

Manage Risk And Fraud Across The Entire Customer Lifecycle N E T M I N D E N T E R P R I S E C U S T O M E R R I S K & F R A U D M A N A G E M E N T Manage Risk And Fraud Across The Entire Customer Lifecycle NetMind is a cutting edge, enterprise class risk and

More information

The Forrester Wave : Application Release Automation, Q2 2015

The Forrester Wave : Application Release Automation, Q2 2015 For: Infrastructure & Operations Professionals The Forrester Wave : Application Release Automation, Q2 2015 by Amy DeMartine and Kurt Bittner, April 14, 2015 Key Takeaways I&O Pros Are Turning Toward Release

More information

RSA Adaptive Authentication For ecommerce

RSA Adaptive Authentication For ecommerce RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers

More information

by Michael Speyer with Eric G. Brown, Emily Van Metre, and Christina Lee

by Michael Speyer with Eric G. Brown, Emily Van Metre, and Christina Lee Includes data from Business Data Services, Client Choice SaaS Economics Will Change ISVs SI And VAR Channels Channel Managers: Retool Partner Programs To Prevent SaaS Delivery Disaster by Michael Speyer

More information

How To Compare The Profit From Aaas To Onpremise On A Computer Or A Server Or Server (Forrester)

How To Compare The Profit From Aaas To Onpremise On A Computer Or A Server Or Server (Forrester) September 20, 2006 Comparing The ROI Of SaaS Versus On-Premise Using Forrester s TEI Approach by R Ray Wang TECH CHOICES Helping Business Thrive On Technology Change TECH CHOICES Includes a TEI model and

More information

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.

More information

For Enterprise Architecture Professionals

For Enterprise Architecture Professionals Case Study: How Wyeth Upgraded Its B2B Operations To Support A Global ERP Strategy Ken Vollmer with Alex Cullen and Matt Czarnecki Executive Summary Wyeth Pharmaceuticals recently completed a major upgrade

More information

April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise

April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise by Usman Sindhu for Security & Risk Professionals Making Leaders Successful Every Day April 29, 2010 The Security Of B2B: Enabling An

More information

Closing the Biggest Security Hole in Web Application Delivery

Closing the Biggest Security Hole in Web Application Delivery WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security

More information

For Enterprise Architecture Professionals

For Enterprise Architecture Professionals Case Study: Using SOA And BPM To Support Enterprise Agility How A Florida College Used An Integrated Approach To Reach Its Goals by Ken Vollmer with Gene Leganza and Matt Czarnecki Executive Summary Case

More information

Strategically Detecting And Mitigating Employee Fraud

Strategically Detecting And Mitigating Employee Fraud A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection

More information

May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011

May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011 May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011 by Noel Yuhanna for Application Development & Delivery Professionals Making Leaders Successful Every Day May 6, 2011

More information

Consumer Web Portals: Platforms At Significant Security Risk

Consumer Web Portals: Platforms At Significant Security Risk A Custom Technology Adoption Profile Commissioned By RSA December 2013 Consumer Web Portals: Platforms At Significant Security Risk 1 Introduction The increasing number of digital identities, prevalence

More information

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering

More information

BT Managed Fraud Reduction. Confidence in online business from stronger identity assurance

BT Managed Fraud Reduction. Confidence in online business from stronger identity assurance BT Managed Fraud Reduction Confidence in online business from stronger identity assurance The BT Managed Fraud Reduction service cost-effective solution to the problem of online fraud. disclosure of how

More information

The Total Economic Impact Of SAS Customer Intelligence Solutions Intelligent Advertising For Publishers

The Total Economic Impact Of SAS Customer Intelligence Solutions Intelligent Advertising For Publishers A Forrester Total Economic Impact Study Commissioned By SAS Project Director: Dean Davison February 2014 The Total Economic Impact Of SAS Customer Intelligence Solutions Intelligent Advertising For Publishers

More information

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity

More information

Fraud Alert Management The Power of an Integrated Approach. Eric Kraus, Sr. Director Fraud Product Management

Fraud Alert Management The Power of an Integrated Approach. Eric Kraus, Sr. Director Fraud Product Management Fraud Alert Management The Power of an Integrated Approach Eric Kraus, Sr. Director Fraud Product Management FIS Fraud Management Who We Are FIS Fraud Management 7,600+ financial institutions served 47

More information

Product. Credit Card Management Comprehensive, Online Credit Card Account Management

Product. Credit Card Management Comprehensive, Online Credit Card Account Management Product Credit Card Management Comprehensive, Online Credit Card Account Management Give cardholders a complete, real-time view of their credit card account information while reducing your total cost of

More information

Building the Foundations for Next Generation Consumer Payments

Building the Foundations for Next Generation Consumer Payments 1 Building the Foundations for Next Generation Consumer Payments Steve Whiting Head of Business Development EMEA Alaric System Joaquin de Valenzuela Muley Senior Director Oracle Financial

More information

An Oracle White Paper November 2012. Fraud Fight: Enterprise-wide Strategy Sets the Stage for Victory

An Oracle White Paper November 2012. Fraud Fight: Enterprise-wide Strategy Sets the Stage for Victory An Oracle White Paper November 2012 Fraud Fight: Enterprise-wide Strategy Sets the Stage for Victory Executive Overview... 2 Introduction... 2 Schemes Become More Complex... 5 The Need for Speed and Cross-Channel

More information

Products Currency Supply Chain Management

Products Currency Supply Chain Management Products Currency Supply Chain Management Today s Enterprises Need Intelligent and Integrated Solutions to Optimize Currency Levels, Reduce Expenses and Improve Control Products The financial services

More information

Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts (2015-2020)

Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts (2015-2020) Brochure More information from http://www.researchandmarkets.com/reports/3421400/ Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts (2015-2020) Description: Increasing penetration

More information

one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

one admin. one tool. Providing instant access to hundreds of industry leading verification tools. 2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose

More information

ebay Enterprise Is A Strong Performer Among Omnichannel Order

ebay Enterprise Is A Strong Performer Among Omnichannel Order For ebusiness & Channel Strategy Professionals July 29, 2014 ebay Enterprise Is A Performer Among Omnichannel Order Management Vendors Excerpted From The Forrester Wave : Omnichannel Order Management,

More information

ACI SELF-SERVICE BANKING

ACI SELF-SERVICE BANKING DELIVERS CONTROL, CHOICE AND FLEXIBILITY PRODUCT FLYER ACI SELF-SERVICE BANKING SINGLE INTEGRATED PLATFORM FOR ONLINE, MOBILE AND VOICE EXTENSIBLE REAL-TIME CONSUMER AND BUSINESS TRANSACTIONS AND PAYMENTS

More information

TrustDefender Mobile Technical Brief

TrustDefender Mobile Technical Brief TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.

More information

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer. THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from

More information

Product. Opencheck A Comprehensive Check Payments Solution to Meet the Demands of Financial Institutions in Today s Automated Environment

Product. Opencheck A Comprehensive Check Payments Solution to Meet the Demands of Financial Institutions in Today s Automated Environment Product Opencheck A Comprehensive Check Payments Solution to Meet the Demands of Financial Institutions in Today s Automated Environment Product As acceptance of electronic payment channels expands, your

More information

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

expanding web single sign-on to cloud and mobile environments agility made possible

expanding web single sign-on to cloud and mobile environments agility made possible expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online

More information

WHITE PAPER Moving Beyond the FFIEC Guidelines

WHITE PAPER Moving Beyond the FFIEC Guidelines WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device

More information

How To Use Proactive Notification For Business

How To Use Proactive Notification For Business Proactive Outbound Notification Saves Money And Provides A New Level Of Personalized Services To Customers by Elizabeth Herrell with Robert Whiteley and Margaret Ryan Executive Summary Proactive customer

More information

The Forrester Wave : Loyalty Program Service Providers, Q4 2013

The Forrester Wave : Loyalty Program Service Providers, Q4 2013 For: Customer Insights Professionals The Forrester Wave : Loyalty Program Service Providers, Q4 2013 by Emily Collins, October 30, 2013 Key Takeaways Loyalty Service Providers Don t Just Support Points

More information

Oracle Real Time Decisions

Oracle Real Time Decisions A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)

More information

ABA Deposit Account Fraud Survey

ABA Deposit Account Fraud Survey ABA Deposit Account Fraud Survey Presented by: Steve Kenneally, Vice President, Payments & Cybersecurity Policy Jane Yao, Senior Vice President, Benchmarking & Survey Research aba.com 1-800-BANKERS 1 2015

More information

Solve Your Toughest Challenges with Data Mining

Solve Your Toughest Challenges with Data Mining IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining

More information

October 1, 2007 The Right CRM Metrics For Your Organization by William Band with Sharyn C. Leaver and Mary Ann Rogan

October 1, 2007 The Right CRM Metrics For Your Organization by William Band with Sharyn C. Leaver and Mary Ann Rogan The Right CRM Metrics For Your Organization by William Band with Sharyn C. Leaver and Mary Ann Rogan EXECUTIVE SUMMARY Forrester interviewed 58 executives about their best practices for getting more value

More information

www.hcltech.com Get Ready for Tomorrow, Today. Redefine Your Security Intelligence

www.hcltech.com Get Ready for Tomorrow, Today. Redefine Your Security Intelligence www.hcltech.com Get Ready for Tomorrow, Today. Redefine Your Security Intelligence Balancing Accessibility and Risk The challenge before enterprises is to provide accessibility and protect their online

More information

The Forrester Wave : Customer Analytics Solutions, Q4 2012

The Forrester Wave : Customer Analytics Solutions, Q4 2012 FOR: Customer Intelligence Professionals The Forrester Wave : Customer Analytics Solutions, Q4 2012 by srividya sridharan, October 26, 2012 key TakeaWays Customer analytics Users Want help across The analytics

More information

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Product. Corillian Business Online Corporate Treasury Management Solution on the Industry s Best Online Banking Platform

Product. Corillian Business Online Corporate Treasury Management Solution on the Industry s Best Online Banking Platform Product Corillian Business Online Corporate Treasury Management Solution on the Industry s Best Online Banking Platform Online Corporate Banking Today Realtime liquidity management and access to relevant

More information

For Customer Intelligence Professionals

For Customer Intelligence Professionals Intelligence-Powered CRM Enhance Existing CRM Initiatives With Customer Intelligence by Suresh Vittal with Dave Frankland and Allison Smith Executive Summary As organizations become increasingly customer-centric,

More information

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit

More information

Build An Outside-In Contact Center Road Map

Build An Outside-In Contact Center Road Map FOR: Application Development & Delivery professionals Build An Outside-In Contact Center Road Map by Art schoeller, november 20, 2012 key TakeaWays Link your Contact Center investments To The Customer

More information

Solution Brief Efficient ecommerce Fraud Management for Acquirers

Solution Brief Efficient ecommerce Fraud Management for Acquirers Solution Brief Efficient ecommerce Fraud Management for Acquirers Table of Contents Introduction Sophisticated Fraud Detection and Chargeback Reduction Improved Compliance Posture Transparent User Experience

More information

WHITEPAPER. Unlocking Your ATM Big Data : Understanding the power of real-time transaction analytics. www.inetco.com

WHITEPAPER. Unlocking Your ATM Big Data : Understanding the power of real-time transaction analytics. www.inetco.com Unlocking Your ATM Big Data : Understanding the power of real-time transaction analytics www.inetco.com Summary Banks and credit unions are heavily investing in technology initiatives such as mobile infrastructure

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Understand Communication Channel Needs To Craft Your Customer Service Strategy

Understand Communication Channel Needs To Craft Your Customer Service Strategy For: ebusiness and Channel strategy Professionals Understand Communication Channel Needs To Craft Your Customer Service Strategy by Kate leggett, march 11, 2013 Key TaKeaWays The Majority of Consumers

More information

Finance and Accounting outsourcing e-commerce solutions. Financial Solutions

Finance and Accounting outsourcing e-commerce solutions. Financial Solutions Finance and Accounting outsourcing e-commerce solutions Financial Solutions Supporting the future of e-commerce: success strategies for the trading world of tomorrow SOLUTIONS FOR YOUR INDUSTRY arvato

More information

2010-2014. Sample Global Network Security Market. 1 technavio insights

2010-2014. Sample Global Network Security Market. 1 technavio insights 1 technavio insights About TechNavio Technavio is the research platform of Infiniti Research. Infiniti Research provides actionable market intelligence to leading companies worldwide. A team of 120 analysts

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

How To Onboarding

How To Onboarding February 6, 2012 A Strategic Approach To Onboarding Financial Service Consumers by Brad Strothkamp for Consumer Product Strategy Professionals Making Leaders Successful Every Day February 6, 2012 A Strategic

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Catching Fraudsters In Real Time

Catching Fraudsters In Real Time Catching Fraudsters In Real Time Aaron Tietz aaron.tietz@tufts.edu Mentor: Ming Chow Abstract Unlike physical store retailers, e-retailers are responsible to repay customers for money lost due to fraudulent

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

A Guide Through the BPM Maze

A Guide Through the BPM Maze A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM

More information

September 16, 2008 Why IT Service Management Should Matter To You

September 16, 2008 Why IT Service Management Should Matter To You September 16, 2008 Why IT Service Management Should Matter To You by Evelyn Hubbert for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day Client Choice topic September 16,

More information

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

Analytics, Big Data, & Threat Intelligence: How Security is Transforming Analytics, Big Data, & Threat Intelligence: How Security is Transforming Jason Sloderbeck Director, Product Management RSA Web Threat Detection 1 Presentation Overview The Largest Threat How Can Big Data

More information

WHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk

WHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk WHITEPAPER Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk Overview Angoss is helping its clients achieve significant revenue growth and measurable return

More information

Fighting Online Fraud

Fighting Online Fraud White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Fraud Management Solutions. Decision Manager Detect more fraud accurately and faster with the world s largest fraud detection radar

Fraud Management Solutions. Decision Manager Detect more fraud accurately and faster with the world s largest fraud detection radar Fraud Management Solutions Decision Manager Detect more fraud accurately and faster with the world s largest fraud detection radar 02 Fraud Management Solutions CyberSource Decision Manager: The World

More information

ThreatMetrix Persona DB Technical Brief

ThreatMetrix Persona DB Technical Brief ThreatMetrix Persona DB Technical Brief Private and Scalable Entity/Attribute Database Persona DB is part of the TrustDefender Cybercrime Prevention Platform from ThreatMetrix. It s an extensible, enterprise-accessible

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information