Transactional Fraud Detection A Modular Approach

83 %
17 %
Information about Transactional Fraud Detection A Modular Approach

Published on August 4, 2011

Author: ronnees1


IBM Software Thought Leadership White PaperWebSphereTransactional fraud detection:A modular approachAddressing the next generation of financial crimes

2 Transactional fraud detection: A modular approachContents This white paper discusses the benefits of collaboration and constructively challenging the status quo by integrating different 2 The deployed software model versus the evolution technologies to form a comprehensive fraud detection and of fraud prevention solution that meets specific business requirements. It 2 Challenge currently deployed solutions also provides key considerations for developing a strategic road map for detecting and preventing enterprise financial crimes. 2 Finding the right transactional fraud detection vendors 2 Leverage multiple technologies to stop persistent The deployed software model versus the fraudsters evolution of fraud As fraud detection professionals know, fraud is a constantly 3 React quickly with real-time fraud detection evolving organism. Like a virus, it evolves and mutates to seek out weaknesses in an incumbent detection system and, once 3 Know the leading nonmonetary fraud indicators found, will quickly exploit those weaknesses before moving—or 3 Base solutions on integrated technology changing—to ensure continuous income for the fraudster or organized group. Prevention methods that work today cannot be 4 Look beyond packaged solutions guaranteed to work tomorrow. The reality of this limitation is that deployed, packaged software applications require costly andIntroduction bulky upgrades or retraining over time just to keep pace withThe increasing prevalence of enterprise financial crimes has fraud trends. The applications are only effective for a short timemade fraud prevention and investments in prevention technol- before they must be upgraded or replaced. Today, more effectiveogy a long-overdue priority to organizations around the world. technologies are enabled by deploying components throughAs a result, organizations are learning that the consolidated cloud computing and through more mature software as a servicesoftware platform approach to fraud detection is fundamentally (SaaS) models.flawed and falls short on detecting and preventing fraudulenttransactions. Challenge currently deployed solutions Fraud software today is significantly richer in feature functional-Instead, there are more effective ways to help fraud strategy ity than legacy solutions. But organizations should question ifmanagers and their organizations avoid the many pitfalls of their current solutions are keeping pace with the continuousdeployment, deliver on the promise of holistic coverage evolution of fraud or if they are merely providing a richer userand increase the chances of successful delivery aligned with interface that employs the same detection routines as its legacybusiness goals. A “one-size-fits-all” offering is unlikely to counterparts. For instance, one example of an ongoing problemdeliver enterprise-class performance with results that benefit with legacy solutions is high false positive rates (FPRs) andthe organization and the customer. To achieve high perform- inappropriate transaction declines, both of which negativelyance, organizations must align strategic vision with industry impact customer service. To maintain competitive advantage,knowledge. organizations must treat valued customers as such. Decisions

IBM Software 3about transactional viability should be based on sound, clearly reported, these vendors can make data available to antifraudunderstood logic and they should be modifiable as needed. group consortium members to assist in catching fraudsters and“Black-box” detection paradigms, typically based on neural closing down concurrent attacks across multiple institutions.networks and other, similar, paradigms, are not the only means Effective data management and security coupled with strongof providing effective fraud detection that is tempered with analytical capabilities provide the technological backbone forrespectful customer service. implementing effective detection strategies that can be shared across consortium participants.Finding the right transactional frauddetection vendors React quickly with real-time fraudIt is important to note that just because it is possible to access detectiondata in a transaction system for fraud detection, it does not Legislative, technological and competitive pressures aremean that fraud technology vendors have the ability to design a shortening the timeframe for reacting to fraud threats.transactional fraud detection system. For instance, antimoney- Real-time fraud detection may be the only effective way tolaundering (AML) systems are designed to ensure compliance block fraudulent transactions. Additionally, as organizationswith regulatory requirements, not to catch fast-moving fraud. move toward real-time capabilities, those that have not adoptedTypically, an AML system will not flag a low FPR, given that this functionality will be even more exposed as fraudsters learnauditors and compliance resources may prefer to decline more that a weak link exists. For instance, in the United Kingdom,transactions to err on the side of caution. Requiring an AML real-time funds availability and the “faster payments” initiativesystem to do the opposite and provide high-quality alerts with mean that “day 2” fraud processes will become obsolete in a fewlow FPRs is nearly impossible since the system is being asked to years. Next-generation technology must be able to adapt anddo something for which it was not designed. Reengineering the grow as market dynamics continue to change to justify anysystem for this purpose is usually ineffective. strategic investment.Leverage multiple technologies to stop Know and analyze nonmonetary fraudpersistent fraudsters indicatorsFraud is a problem that transcends individual organizations. Nonmonetary account activity is a significant indicator ofIt does not respect corporate boundaries, and fraudsters will potentially fraudulent action, and yet, many organizations eitherprey on the fact that legal and technological constraints often ignore or are unable to capture and react to these indicators.make effective data sharing within organizations impossible. It is Over time, disparate and seemingly unconnected events, orcommon to find that, after multiple fraudulent events, the same nonevents, associated with an address change request, a passwordperson or group has been perpetrating similar attacks concur- change request or PIN change request can be strong indicatorsrently on peer institutions. However, some data security vendors of account takeover or identity theft. The use of powerfuland storage providers act as trusted custodians that can provide predictive analytics technology and complex event processingaccess to transactional detail that shows what is happening at anindustry level. As fraud or suspicious activity is identified or

4 Transactional fraud detection: A modular approachfunctionality can help organizations understand the nature of Look beyond packaged solutionstheir fraud problem better before the event. Organizations need Fraud detection practitioners and strategists need to look beyondthe ability to assess a sequence of events or nonevents and assign the capabilities provided by packaged solutions. By partneringa risk/threat level to that combination of activities at the front with an external consultant, organizations may confirm thatend. Preventing fraud is significantly more desirable than existing software capabilities and associated operational practicesdeploying expensive resources to manage the results of fraud— are adequate. If not, a consultant can also provide an effectivefor the organization and, more importantly, for the customer. review and recommendations for operational enhancement.Deploying this mix of technology, analytics and human-centric Enhancement efforts should complement existing capabilities,knowledge can provide significant operational efficiencies, and existing budgetary constraints, while providing a nondisrup-enhanced detection rates and an improved customer experience. tive path to improved detection and prevention.Base solutions on integrated technology To implement effective fraud detection, card issuers mustEffective fraud detection capabilities face a multitude of chal- develop an understanding of the enhanced capabilitieslenges across different payment methods. i.e. online, deposit, provided by predictive analytics, pattern and name matching /ATM, check, debit card and ACH/wire. To effectively meet recognition, complex event processing, business rules, contentthese challenges, organizations must be able to move from analytics and, most importantly, the means for implementation.fragmented fraud detection and prevention to an environment IBM’s ability to draw on best-of-breed components ensures thatthat is equipped to address the evolving threat of fraudulent an issuer is not tied to a specific specialization or paradigm, a keyactivity in an integrated, holistic, enterprise-wide fashion. benefit when considering the specific nature of card fraud withinThey must ask questions like: Is this technology a viable and any single geography. IBM and its broad partner ecosystem areachievable ambition for return on investment? How much uniquely positioned to assist institutions that are ready to begindepends on technology and how much on the implementation this journey.of industry and domain knowledge? What are the benefits forthe organization and its customers? And in short, is it worth Conclusioninvesting in improvement? The fight against fraud is continuous and evolving at a rapid pace, and the sophistication of fraudulent attacks is ever increas-The answer is yes. Any organization that stops investing in ing. In planning the strategy for future prevention and mitiga-technology to combat evolving and mutating fraudulent activity tion efforts, organizations should consider external challengesis effectively writing a blank check for the fraudster. However, and whether their current solutions are able to address thoseinvestment in technology alone is not sufficient to mitigate challenges. New technologies can provide more effective ways tofraudulent activity. Any investment must conform to a clear monitor and detect fraud and better position the organizationvision and strategy that is likely to be multiphased over several for success. While examining different solutions, it is importantyears and able to evolve over time. While packaged solutions to develop an understanding of the underlying detection logic.may seem effective, as outlined in the previous section, a“one-size-fits-all” solution is destined to fail.

IBM Software 5The most effective solution sets are those that can adapt quickly, About the authorsoffer industry and enterprise breadth, can function in real-time Richard Collardand monitor cross-channel activity. IBM Worldwide Subject Matter Expert Transactional Fraud Detection, AML and Risk ManagementIBM’s approach to fraud detection and prevention is aligned and executed through the technological and commercialvision that IBM customer and business partner FIS offers. FIS’ Richard Collard comes to IBM as part of the acquisition, indepth of experience and acquisition strategy, which includes 2009, of ILOG. He draws on a business-based career withCertegy and Metavante among others, ensures that its core major global fraud analytics organizations and specializes in theofferings are infused with ideas and best practices from different, provision of fraud detection solutions and consulting for creditbut aligned, industries. and debit card issuers and for AML. Prior to joining ILOG, he worked to develop a radical, new approach to rules-based fraudFor more information detection through the automated generation of rules usingFor more information about fraud detection solutions from genetic algorithms and evolutionary computing techniques. ThisIBM, contact your IBM representative or IBM Business Partner, technique is holistic and non-prescriptive, espousing the beliefor visit: that there is no such thing as a “one-size-fits-all solution,” and is aligned with IBM’s modular approach to the challenges facingFor more information about fraud in the United Kingdom, visit the card industry.the UK Cards Association at Richard’s operational reviews for card issuers in South AfricaAdditionally, financing solutions from IBM Global Financing have generated significant savings and operational efficiencies.can enable effective cash management, protection from technol- They have also been instrumental in the recent adoption ofogy obsolescence, improved total cost of ownership and return business rules management systems (BRMS) technology as aon investment. Also, our Global Asset Recovery Services help major component of a hosted fraud detection solution. Richard’saddress environmental concerns with new, more energy-efficient ability to draw on global experience allows significant knowledgesolutions. For more information on IBM Global Financing, visit: transfer of global best practices. His approach is consultative respectful of geography and culture, ensuring that the thought- leadership that he provides is positively received—traits that have earned him significant respect through his engagements.

Aaron CalipariDirector, Product StrategyTransaction Risk ProductsRisk, Fraud and Compliance © Copyright IBM Corporation 2011Aaron Calipari is Director of Transactional Fraud for FIS, where IBM Corporationhe is responsible for risk and fraud management and profitability Software Group Route 100solution strategy and delivery. Calipari has successfully managed Somers, NY 10589 of the original, commercially available fraud case manage- Produced in the United States of Americament software packages while executing a strategy to bring June 2011innovative new enterprise fraud case management capabilities to All Rights Reservedmarket. He co-developed and currently manages a check fraud IBM, the IBM logo and are trademarks or registered trademarksprevention service that has repeatedly outperformed traditional of International Business Machines Corporation in the United States, otherfraud detection methods by combining bank data with industry countries, or both. If these and other IBM trademarked terms are marked ondata sources and analytics. their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may alsoPrior to his role in account management solutions, Calipari be registered or common law trademarks in other countries. A current list ofwas a member of an elite team of market-focused solution IBM trademarks is available on the web at “Copyright and trademark information” at charged with bringing next-generation risk manage-ment capabilities to market through integration with various Other company, product or service names may be trademarks or service marks of others.FIS technologies. His interest and deep domain expertise infraud has been applied to improve performance in the areas of The information contained in this documentation is provided for informational purposes only. While efforts were made to verify thecredit card, check and mortgage fraud. completeness and accuracy of the information contained in this documentation, it is provided “as is” without warranty of any kind,Calipari holds a bachelor’s degree in marketing from the express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM withoutUniversity of South Florida. notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this documentation or any other documentation. Nothing contained in this documentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Please Recycle WSW14165-USEN-00

Add a comment

Related pages

Transactional fraud detection: A modular approach - IBM

2. Transactional fraud detection: A modular approach. Contents. 2. The deployed software model versus the evolution of fraud. 2. Challenge currently ...
Read more

Transactional Fraud Detection A Modular Approach

1. IBM Software Thought Leadership White PaperWebSphereTransactional fraud detection:A modular ...
Read more

Preventing fraud in credit and debit card transactions

Preventing fraud in credit and debit card transactions. ... grated to provide enhanced transactional fraud detection. ... approach is not effective.
Read more

⭐Preventing fraud in credit and debit card transactions

... for a holistic approach 2 Preventing fraud in ... to provide enhanced transactional fraud detection. ... integrated fraud detection ...
Read more

IBM - WebSphere Banking Library - White papers / Solution ...

Preventing fraud in credit and debit card transactions; Transactional fraud detection: A modular approach; Smarter lending, a primary focus for banks and ...
Read more

Transactional Analysis for Effective Fraud Detection Doug ...

Slide 1 ; Transactional Analysis for Effective Fraud Detection Doug Burton ACL Services Ltd. Slide 2 ; ELMER IREY Chief of the US Treasury Enforcement ...
Read more

Fraud Management | SAS

... hybrid approach to fraud detection and ... risk scores with actual transactional ... and modular solutions let you start where ...
Read more

ACH and Wire Fraud Prevention -

ACH and Wire Fraud Prevention ... Wiz Sentri’s transactional fraud ... traditional fraud detection technologies.
Read more

WSW14166USEN -

WSW14166USEN - Download as PDF File (.pdf), Text File (.txt) or read online.
Read more