Intellinx by Intellinx
The Intellinx Difference – Enterprise Fraud Management
Unlike other anti-fraud vendors that require the customer to provide the data for analysis (typically from log files and data warehouses), Intellinx provides a much more comprehensive and effective fraud management solution, covering a wide range of functions, from comprehensive data capture to analytics and investigation tools. The data capture is performed both in the traditional way (analyzing log files and data warehouses) and through patented non-invasive capture of user activity data by sniffing network transmission between end-users and servers. This enables organizations to capture internal and external user activity, including user queries, which are typically not included in existing log files, and therefore cannot be monitored by other anti-fraud solutions.
The Intellinx system is highly flexible and is typically implemented much faster than other anti-fraud systems, providing multiple solutions on the same platform. It allows the customer to control all system aspects including data models, business rules, scoring models, screen layouts, reports, dashboards, workflows, alerts, cases, ETL and link analysis.
Fraud Indicators detectable by Intellinx, which are typically not detected by other solutions:
Fraud Prevention Solutions by 41st Parameter
As the leading provider of dedicated fraud prevention solutions, 41st Parameter’s best practices methodology and patented technologies are responsible for dramatic reductions in fraud losses and subsequent declining attack rates at some of the largest institutions in e-commerce, financial services, and travel services.
Proof of the efficacy and robustness of the solutions are:
Because of 41st Parameter’s deep experience as fraud practitioners and our track record of success at the leading online businesses, we are confident we will produce superior fraud reduction results for your business. Through a combination of best practices, leading technology and exceptional customer service, our innovative solutions provide an unprecedented level of Internet security, decrease the anonymity of the Internet and help you gain valuable insight into every online transaction and customer interaction. We make the process of preventing and detecting fraud easier and more effective, reducing potential losses and operating costs without hindering sales.
Enterprise Fraud Solutions by Nice Actimize
Actimize Enterprise Fraud Solutions deliver real-time, customer-centric fraud prevention that supports a holistic, fraud management program.
Remote Banking Fraud
Provides end-to-end digital banking fraud protection which enables institutions to detect and catch more fraudulent activities with multi-channel, cross transaction, cross payment type fraud detection capabilities.
Commercial Banking Fraud
Specifically designed for the commercial banking environment with customer-centric fraud detection that supports end-to-end fraud management.
Detects fraudulent employee activity across the enterprise, business lines, and channels, providing protection from monetary losses, risk and reputational damage.
Analyzes risk across silos of data and lines of business and consolidates suspicious activity notifications into account and customer level alerts allowing real-time decisioning from a “holistic view” of the customer to safely accelerate fund availability and enhance customer satisfaction.
Customer-centric, cross-channel, and cross-product fraud detection which protects ATM, PIN and signature POS, and Card-Not-Present transactions.
Key Benefits of Actimize Integrated Fraud Management
Financial institutions are increasingly challenged by sophisticated fraud attacks, evolving regulations and legislation, increasing pressure to release new and innovative products, and the imperative to enhance customer experience to improve acquisition and retention. With its customer centric, enterprise-wide fraud prevention capabilities, Actimize allows financial institutions to:
Detect and prevent fraud across all bank channels and financial products, and respond rapidly to changing fraud patterns and regulations, with a comprehensive set of fraud management tools and capabilities.
Apply proven analytics, detection logic authoring, and Actimize's breadth of global fraud expertise for superior detection model performance. Monitor transactions in real time, allowing for targeted interdiction to minimize losses and improve customer experience.
Streamline fraud operations and support core fraud management functions - alert routing and prioritization, workflow management, investigation, and operational performance reporting - with intuitive, web-based tools.
Enable risk-based authentication methods and customer contact strategies for effective fraud prevention and an enhanced customer experience. Allow customers to continue to transact while fraudulent attempts are blocked for investigation with real-time detection and efficient fraud resolution processes.
Aggregate inputs from multiple channels, systems, and vendors through the risk hub which ingests the information, enriches scoring and activity and provides consolidated alerts and a holistic view of risk.
Kount by Kount
For All Types of Online Merchants and Retailers
Boost Sales, Beat Fraud with Kount. Kount helps online businesses boost sales by reducing fraud and allowing them to accept more orders. Our all-in-one, SaaS platform is designed for companies operating in card-not-present environments, simplifying fraud detection and dramatically improving bottom line profitability. Merchants using Kount can accept more orders from more people in more places than ever before.
For each transaction, Kount’s “decisioning” engine analyzes hundreds of relevant variables and activity across the globe in real-time providing the most accurate fraud prediction available. While reducing the risk of fraudulent activity, Kount’s intuitive business intelligence tools help merchants increase revenue opportunities in the future, thus boosting sales while reducing fraud and dramatically reducing, or eliminating, the need for manual review.
Kount is a single, turnkey fraud solution that is easy-to-implement and easy-to-use. Kount’s proprietary technology has reviewed hundreds of millions of transactions and provides maximum protection for small businesses to some of the world’s best-known brands.
For Payment Service Providers
Kount SMB™ is an enterprise-class, real-time fraud platform made available to small and medium sized merchants through a network of payment service providers and gateways. Developed for merchants under $10 million in annual revenues, Kount SMB doesn’t skimp on the level of protection you can provide your merchants.
The same fraud management platform that protects F1000 companies is now available to your merchants too. Kount SMB is a unique collection of key functionality from Kount’s core system that makes it easy for processors to offer a proven solution to all their merchants.
Designed with smaller merchants in mind, the Kount SMB platform includes; a streamlined, automated boarding process, simplified integration and a user interface that’s easy, intuitive and efficient so merchants can be up and running in minutes. Kount SMB uses a real-time fraud control platform, which provides the tools necessary to fight all types of fraud for Internet and CNP businesses with response times that average less than 350 milliseconds.
ThreatMetrix by ThreatMetrix
ThreatMetrix™ is an innovation leader in the cybercrime and fraud prevention space, and has the following market leading technologies in its portfolio.
Global Trust Intelligence Network
ThreatMetrix profiles tens of millions of users and their devices every day and processes hundreds of millions of transactions every month. Tap into this Global Trust Intelligence Network and obtain the most accurate security and fraud prevention capability available.
Trust Tags are important elements within the ThreatMetrix Global Trust Intelligence Network. These digital labels can be applied to various combinations of entities within a user’s persona to indicate the trustworthiness of the user, whether it is a customer accessing online services or an employee using company business applications.
Global Policy Engine
Leverages aggregated information and patterns collected from thousands of websites globally and combines those with your specific business rules to provide a real-time risk assessment for each site visitor.
We don't need to know your name to know who you are. Persona Identification builds a complete profile of users and then compares your website visitors to its Persona IDs to understand if a visitor is not who they say they are.
ThreatMetrix cloud-based, real-time complex device identification and identity verification solution protects companies against cybercriminals and helps validate valuable returning customers and prospects. ThreatMetrix's complex device identification protects all online access and transaction requests, including remote employee access, account creation, login authentication and payment authorization.
ThreatMetrix provides a cloud-based, real-time solution that helps companies identify illegitimate users, potential fraud, malware, man-in-the browser (MitB) and Trojan attacks, and data breaches. It mitigates the risk of hidden malware compromising authenticated sessions to steal data, identities or money.
Proxy and VPN Detection
ThreatMetrix proxy and VPN detection unmasks malicious users who are trying to cover their tracks by hiding behind proxy and VPN servers. Proxy and VPN detection helps you screen out web visitors that may be pretending to be somewhere they are not.
ThreatMetrix's secure browsing solution incorporates patent-pending technology, and is a client-based, real-time solution that protects transactions against fraud, malware, and data breaches. A small client component installed on end-user computers identifies and isolates malware, verifies legitimate websites and protects online transactions with your site.
Mobile Device Identification
With their growing popularity, smartphones and tablets are particularly susceptible to compromise, malware and theft. TrustDefender™ Mobile embeds risk intelligence into your mobile apps, protecting your business from fraud originating from these unsecured devices.
NuDetect by NuData Security
NuDetect Features: Prevent Identity Theft Online
NuDetect is a comprehensive behavior analytics platforms that identifies and confronts criminals with early user profiling and threat appropriate countermeasures. NuDetect highlights their intent before they have a chance to penetrate your website and do damage.
Whether deployed via native app or website, NuDetect uses mobile optimised event sensors for maximum acuity and security across your mobile apps and services.
Real-time Detection and Mitigation
Our system monitors activity in real time, allowing you to take action against fraud, as it happens.
Customized sensors which are specific to your business’s unique security requirements gives you contextual intelligence.
Historical Context Awareness
NuDetect uses historical cross-session and cross-cloud behavior patterns, stored in the NuData cloud. This gives incredible accuracy and safety from day one.
Invisible to users
Our invisible implementation means that you can assess risk and present reasonable security countermeasures, only to the most suspicious actors.
Adaptive Counter Measures
Suspicious actors are challenged with threat appropriate countermeasures not only designed to impede or stop a suspect but to give further intelligence on the nature of the suspect.
Decrease Customer Abandonment
Comprehensive profiles ensures you do not deploy unnecessary countermeasures against your hard earned users.
Machine learning created positive and negative behavior patterns which are automatically adapted in real-time. Stored in the NuData cloud, your web service will benefit from thousands of intelligence profiles.
Trigger Alerts and Countermeasures
You are in control of the levels of alerts and what those alerts can trigger. NuDetect lets you decide what to do and when to do it.
NuDetect attributes a unique score to every user interaction. A customised risk model provides actionable intelligence, specific to your business.
iovation Reputation Manager 360 by iovation
Prevent Fraud with Device Reputation.
Identifying the device used to commit fraud is an effective way to root out fraud — and one that iovation has offered its clients for years. What is new in the fight against fraud is device reputation, a new layer of defense that builds upon device identification and available exclusively from iovation. The only solution on the market today that takes an in-depth look at not only the device but also its history when used online, creating a reputation score.
Set and fine-tune rules to assess risk by leveraging evidence, geolocation, velocity, watch lists, anomalies and risk profiles.
Reporting & Analytics
Analyze trends and report on effectiveness through scheduled and on-demand reports and by working with your client manager.
Geolocation & Real IP
Unmask proxies to find where transactions are originating to know where your users are really coming from.
Block fraud from any Internet-enabled device including PCs, smartphones, tablets, laptops and even consoles.
Respond to threats fastest with our web service implementation, or deploy with gateway or through a third-party service.
Automate Accept, Review and Deny responses through our API and take action against risks in milliseconds.
FraudMAP Online by Guardian Analytics
Proactively Detect Online Banking Fraud – Stop Fraudulent ACH & Wire Transfers
Financial Institutions of all sizes use FraudMAP Online to proactively identify account takeover and prevent fraudulent transactions before the money is gone. As the industry's most advanced anomaly detection solution, it delivers sophisticated online fraud detection capabilities plus easy to use investigation and forensics tools.
FraudMAP Online uses Behavioral Analytics to transparently monitor every online banking user and session for unusual activity and anomalous transactions. Monitoring each and every user independently results in the best possible fraud detection with the least possible false positives.
FraudMAP Online automatically protects all retail and business banking account holders from the widest range of existing and emerging threats without impacting the end-user experience.
As the only fraud prevention solution custom built for business banking,FraudMAP Online-Business addresses the unique nature of managing risk and preventing fraud in the complex multi-user business banking environment where complex high-dollar payments to multiple recipients are common. Detect corporate account takeover, fraud setup, and fraudulent ACH or wire transactions, and then proactively intervene without interrupting legitimate online banking activity.
Proactively protect thousands of retail account holders from the widest array of fraud threats without affecting their online banking experience. FraudMAP Online-Retail detects anomalous activity and prevents unauthorized transfers without asking account holders to install and maintain anything. Detect account compromise, suspicious online activity, fraudulent ACH & wire transfers, and cross-channel fraud attacks, and then intervene before the money is gone.
With FraudMAP Online, banks and credit unions can:
Trusteer Pinpoint Malware Detection by Trusteer
Clientless Detection of Malware Infected Devices
Trusteer Pinpoint Malware Detection accurately detects malware infected devices and determines both the nature of the threat and the risk it represents to the organization. Organizations receive alerts about malware infected devices accessing their web sites and can quickly take action to prevent potential fraud. Malware compromised credential information is fed to Trusteer Pinpoint ATO Detection to conclusively identify criminal access. Trusteer Pinpoint is completely transparent to end users and does not require any installation of software on the endpoint.
Detects Malware Infected Devices
When end users access Trusteer-protected applications, Trusteer Pinpoint clientless sensors initiate a device analysis to detect malware infection. Trusteer Pinpoint's analysis provides details on the specific malware kit that was used to generate the malware variant and the malware’s Crime Logic.
Accurately Determines Fraud Risk Levels
Trusteer Pinpoint determines the fraud risk levels for each online transaction, login, or other high-risk action. For example, malware configured to attack an online application accessed via the infected device represents a higher risk than malware not currently targeting that application. Trusteer Pinpoint’s malware detection is very accurate with virtually no false positives.
Alerts Fraud Team of High Risk Devices
Upon malware detection, Trusteer Pinpoint alerts the fraud team on the potential threat. Fraud and security personnel can reach out to the customer and address threat mitigation while suspending or reviewing suspicious transactions associated with the infected device or the compromised account.
Enables Malware Removal via Trusteer Rapport
Organizations using Trusteer Rapport can suggest to users with infected devices to install Trusteer Rapport. Upon installation, the malware will be removed and the device will be protected against future infections, allowing users to safely execute online transactions from their machine.
Feeds Risk Information to Trusteer Pinpoint ATO Detection andRisk Engines
Organizations use Trusteer Pinpoint findings to adjust the risk score associated with online transactions. High risk transactions are often routed for manual verification directly with the customer. Accounts accessed by malware infected devices are reported to Trusteer Pinpoint ATO Detection, to allow detection of account takeover attempts using stolen credentials. In addition, Trusteer Pinpoint findings are fed into risk engines such as RSA, Actimize and Memento to help determine both the risk levels of transactions and mitigating activities.
Detects Evolving Threats and New Attack Vectors
New malware variants are constantly introduced and quickly proliferate in the user base. Trusteer Pinpoint tracks web application anomalies generated by malware, exposing the underlying crime logic of known and emerging threats. When new threats are identified, Trusteer Intelligence Center experts introduce detection and protection capabilities that are quickly integrated into Trusteer Rapport and Trusteer Pinpoint to ensure optimal defense.
Conclusive Account Takeover DetectionBased on Device Identificationand Account Compromise History
Trusteer Pinpoint Account Takeover Detection (PPATO) protects web sites against account takeover and fraudulent transactions. PPATO leverages Trusteer’s visibility to the fraud life cycle to accurately detect criminal access to a customer’s account. It correlates new and spoofed device fingerprints, real-time phishing incidents and malware infected account access history to conclusively identify account takeover attempts, minimize customer burden, and eliminate IT overhead.
Trusteer Pinpoint Account Takeover Detection and Trusteer Pinpoint Malware Detection enable organizations to holistically address online fraud including malware-initiated fraudulent transactions (from the customer’s device) and account takeover (from the criminal’s device).
Detects New, Spoofed and Criminal Devices Using Complex Device Fingerprint
PPATO collects a variety of attributes to generate a unique “fingerprint” for each device accessing the protected web site. Criminals try to evade device fingerprinting systems by spoofing device attributes, such as the operating system, browser and IP address. Trusteer identifies these spoofing attempts, which are a strong indicator of fraudulent access. Criminal devices are automatically added to a global repository that is shared across organizations in order to prevent account takeover.
Identifies Real-time Phishing Incidents
PPATO server-side technology detects phishing incidents in real-time, including the site URL and compromised credentials. When Trusteer Rapport is used by the end user, it also detects user submission of credentials to suspected phishing sites. Organizations are notified of phishing campaigns and can initiate site takedown and URL blacklisting. Real-time phishing incidents data is used to conclusively identify account takeover attempts which often use phished credentials.
Correlates Device and Account Risk for Conclusive Account Takeover Detection
Since device fingerprint is often insufficient to conclusively detect account takeover, PPATO correlates device risk factors with real-time data on account malware infections and phishing incidents to accurately detect criminal access. For example, access from a new device shortly after malware was detected on a different device used with the same account is a conclusive indication of account takeover fraud.
Comprehensive Coverage of All Attack Vectors in Real-time
Fraudulent transactions are generated via two attack vectors: malware on the customer device and account takeover performed by criminals using stolen credentials and personal information. Trusteer Pinpoint Malware Detection detects malware infection in real time to stop malware initiated transactions. PPATO stops account takeover by conclusively detecting criminal access using correlation of device risk and account compromise history.
Accertify Fraud Management by Accertify
Accertify® Fraud Management leverages vast and disparate enterprise data, driving better fraud detection with fewer false positives.
Constantly evolving card-not-present fraud easily defeats fraud detection products that are inflexible or use limited data types. These products can lose their effectiveness over time allowing fraud rates to creep higher, putting the merchant right back where they started.
Accertify® Fraud Management was developed to perform well beyond these limitations through our advanced, scalable and highly flexible Interceptas® Data Management Platform.
At its core, the Interceptas® Platform is data-focused, enabling it to effectively and efficiently make use of vast and disparate enterprise data to more completely and accurately detect fraud.
Available American Express® Risk Management feature integration further increases screening accuracy through extensive and highly effective fraud identification technologies.
The built-in flexibility of our solution enables quick customization. Accertify Fraud Management can easily adapt and change to effectively address new fraud schemes, future-proofing our solution and ensuring optimal performance over time.
Our complete portfolio of solutions, services and applications offers customers with a virtually unlimited number of options to address their unique business issues across the payment lifecycle.
Fraud Analyst by Digital Resolve
Real-Time Fraud Identification and Prevention
Online Behavior Monitoring and Fraud Detection for Real-Time Protection
Digital Resolve addresses the full fraud lifecycle, bridging front-end authentication and post-transaction analytics by identifying and tracking all user activity in real time -- from the point of entry to your online channel through every step of a user's interaction with your site.
With Fraud Analyst's powerful Fraud Analysis Engine, all user traffic is monitored in real-time to uncover the sequential unfolding of activities. In this way, online activities are continually reassessed and rescored, adding perspective to events that may seem uninteresting in isolation or that may appear to be fraudulent at first glance -- but are perfectly legitimate for a particular online user.
All activity is tracked at the customer, account, transaction and site levels to provide unsurpassed insight into activities for each individual, across accounts, for all transactions. Should the analysis engine detect unusual activity, the systems scores the event and a browser-based interface delivers the information you need to understand exactly what's happening and why, and flexible response mechanisms allow your organization to address incidents based on your business, risk and operational policies.
Fractals by Alaric
Fractals is a leading intelligent fraud detection and prevention product. It delivers value to all players in the transaction chain - issuers, acquirers, processors, networks, PSPs, ISOs and merchants - and for all product types - credit, debit, prepaid or gift card - through a combination of self learning models and user defined rules.
Fractals can tackle any type of transactional fraud problem including cross product, cross channel, enterprise fraud detection and prevention. It will handle transactions from any channel from ATM and POS to internet and mobile. And covers all account and product types.
Fractals is a multi-organisation, multi-hierarchy, multi-channel, multi-currency solution.
Rare among fraud detection solutions, Fractals is PA-DSS certified.
Rules plus models
Fractals enables the knowledge and experience of fraud analysts to be combined with intelligent models that are automatically calibrated using Alaric’s proprietary inference techniques based on Bayesian methods.
Fractals has multi-level rules, which are rules that can act on the outcome of other rules, as well as transaction data and model scores, to produce actionable authorization decisions.
Fractals fraud models are self-learning – meaning that they self-adapt as soon as a fraud analyst marks a transaction as being fraudulent. Self-learning models deliver a huge improvement in detection rate, a much reduced false positive ratio and a high rate of fraud detection on the first fraud in a run.
Self-learning models combined with true real-time, in-flight fraud blocking, deliver exceptional fraud savings.
Fast delivery, implementation and go-live
Integration is a costly and time consuming stumbling block for most fraud solution suppliers. But Alaric is different - it is expert in integrating payment systems as well as fraud.
Fractals includes Alaric’s integration technology, Message Mapper, which enables interfaces between systems to be configured rapidly, usually without any programming. This means that Fractals can be up and running very quickly, fully integrated with internal systems and external data feeds including in-flight fraud blocking.
For clients using Authentic, true real-time, in-flight integration with Fractals is available out-of-the-box.
Total Fraud Protection by Easy Solutions
Flexible and comprehensive multi-layered defense across all devices, channels and clouds.
Easy Solutions understands that the level of engagement and complexity of every deployment is different, and that our customers need solutions that can scale to the needs of their business instead of requiring the business to adopt the needs of the solution.
Total Fraud Protection is the core principle that drives our solutions and our innovative design to ensure that Easy Solutions provides the very best in omni-channel, multi-platform, flexible integrations. This core principle allows for our solutions to work independently of each other, but can also deliver a collaborative protection suite of products that leverage every aspect of a fraud prevention program when deployed together. The powerful APIs and SDKs add more value in allowing our customers to leverage previous investments and development efforts and benefit from the next generation of anti-fraud solutions.
By understanding complex fraud attacks, Easy Solutions is able to engage fraud throughout the attack cycle. This gives Easy Solutions an advantage at proactive take-down, monitoring, identification and interception, effectively mitigating fraud before it happens. This approach reduces false positives and the overhead of managing tools while lowering the costs associated with supporting an anti-fraud program.
RSA Fraud Management Solution by EMC-RSA
The RSA Fraud Management Solution helps reduce fraud losses by preventing unauthorized acquisition and use of customer credentials and securing transactions across web, e-commerce, phone, and mobile channels.
DECREASE FRAUD LOSSES
Prevent fraud losses by detecting potential abuse and stopping credential theft in real time.
Discover how and where your business is losing money, credentials, and identities due to fraud.
PRESERVE BRAND REPUTATION
Prevent phishing, pharming, and Trojan attacks to protect your financial assets, brand reputation, and consumer confidence.
PROTECT AGAINST EMERGING THREATS
Ensure prevention of new forms of fraud in both web and mobile channels.
CA AuthMinder™ by CA Technologies
Protect employees and customers with user-convenient, two-factor authentication.
With the increase in the amount of resources and interaction that occurs online, organizations need to provide two-factor authentication for a growing number of users (employees, partners and customers) to a growing number of applications and services (on-premise and cloud-based) from a variety of devices (PC, laptop, tablet and phone).
CA AuthMinder is a versatile multi-factor authentication system that can help you deploy and manage a wide range of authentication methods, from passwords and knowledge-based authentication (KBA) to two-factor software tokens or hardware credentials. It also can provide out-of-band authentication methods such as SMS, email or voice delivery of one-time passwords (OTP). CA AuthMinder supports two-factor authentication to VPNs and can protect access and transactions from PCs, laptops, tablets and mobile phones so that organizations can build a cohesive and comprehensive authentication strategy. It also includes free mobile applications to facilitate the use of mobile devices for strong authentication and software development kits (SDKs) to help easily incorporate two-factor authentication into mobile applications.
The CA AuthMinder server provides a flexible administration console and documented authentication flows to simplify deployment and management. The unique public-key infrastructure (PKI) and OTP software-based credentials that are included provide a higher level of security because of a patented key protection technology that is only available from CA Technologies. CA AuthMinder is integrated with CA RiskMinder™ for adaptive, context aware authentication and CA SiteMinder® Secure SSO and Access Management to provide a robust solution that helps organizations avoid inappropriate access and fraud.
CA RiskMinder™ by CA Technologies
Reduce the risk of improper access and fraud without burdening valid users.
Identity theft, data breaches and online fraud are becoming more common and sophisticated every day. Millions of passwords are stolen or phished each year. In this environment it is clear that there is a need for something more than just password-based protection for employee, partner and customer access to valuable online resources. At the same time it is important to maintain a simple and positive experience for end users. Adaptive or risk-based authentication can allow you to evaluate a set of contextual factors related to an access attempt or transaction to better estimate the risk involved, without impacting the experience for legitimate users.
CA RiskMinder is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud.
CA RiskMinder provides risk-based authentication that can be used to reduce fraud and protect users from Internet attacks whether they are shopping online or accessing confidential or private information via a Web portal or application. It also provides organizations the ability to enforce different levels of authentication depending on the user activity, transaction value and the calculated risk score.