Presentation is loading. Please wait.

Presentation is loading. Please wait.

10.45-11.15Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.

Similar presentations


Presentation on theme: "10.45-11.15Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security."— Presentation transcript:

1 10.45-11.15Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security

2 © 2014 IBM Corporation IBM Security 2 IBM Trusteer Pinpoint Services Making advanced research work for you Online/Mobile Banking Trusteer Cloud Snippets forwards data to IBM cloud 3 IBM Cloud returns actionable information via: -API -Email -Other 5 User connects to Online Banking Application 1 Application returns page, with IBM snippets 2 INTERNET IBM Fraud Experts Analyze Access 4

3 © 2014 IBM Corporation IBM Security 3 IBM Counter Fraud Management DetectRespondInvestigateDiscover Adapt with Agility - Integrated platform capabilities in one product line - Different fraud typologies need different analytical techniques - Ingest more data to find threats (cyber, aml, fraud, identiity) - Best-in-class capabilities blended together for strong defense - Supported with Integrated Implementation Services IBM Counter Fraud Management An unparalleled arsenal of capabilities to combat today’s fraud and compliance threats … and anticipate tomorrow’s schemes

4 © 2014 IBM Corporation IBM Security 4 WWW Phishing and Malware Fraud Advanced Threats (Employees) Online Banking Enterprise Apps Account Takeover, New Account Fraud Mobile Fraud Risk Trusteer Apex Trusteer Rapport Trusteer Pinpoint Malware Detection Trusteer Pinpoint Malware Detection Counter Fraud Management Transactional Fraud Fraud Risk Indicators Compromised Device (Malware) Compromised Account/Credentials (Phishing) Criminal Account Takeover Device Risk (Fingerprint/Location/Reputation) Compromise History (Malware + Phishing) Confirmed Fraud Trusteer Pinpoint Criminal Detection Trusteer Mobile SDK/APP Trusteer Mobile Risk Engine IBM Trusteer and CFM: Combine Cyber Fraud Risk with Cross- Channel Customer and Payments Txn Risk

5 © 2014 IBM Corporation IBM Security 5 IBM Trusteer and CFM: Combine Cyber Fraud Risk with Cross- Channel Customer and Payments Txn Risk Online Banking Counter Fraud Management Trx Review Counter Fraud Management Trx Review 2 1 4 3 +++ Together: High risk! OR Cyber Risk Moderate risk Device Risk New Device ID Remote Access Tool Proxy Device New Location/Time Mobile Risk factors Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Moderate risk Card Online IVR etc

6 © 2014 IBM Corporation IBM Security 6 Use Case: Fraud via Mobile Banking App (with SDK) New device and/or unusual device location + new acct + mobile deposit Online Banking Counter Fraud Management Trx Review Counter Fraud Management Trx Review 2 1 4 3 +++ Together: High risk! OR Cyber Risk Moderate risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

7 © 2014 IBM Corporation IBM Security 7 Use Case: Malware Indicator Used to Limit Activity Credential Theft (malware), New Payees Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 2 1 4 3 +++ Together: Monitor txns (esp higher risk customers) OR Cyber Risk High risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

8 © 2014 IBM Corporation IBM Security 8 Use Case : Account Takeover (Phishing) Credential Theft via phishing, possible ATO, password change Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 2 1 4 3 +++ Together: Monitor high risk activities OR Cyber Risk High risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

9 © 2014 IBM Corporation IBM Security 9 Use Case: New Account Fraud Credentials purchased in underground (no malware/phishing), new account setup Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 2 1 4 3 +++ Together: Moderate Risk. Double check. OR Cyber Risk High risk Device Risk New Device ID Known Fraud Device Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc


Download ppt "10.45-11.15Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security."

Similar presentations


Ads by Google