Financial

Authentication Fraud

Authentication Fraud

The Problem Metered attacks that generate low volume log-in attempts, from diverse IPs and across extended time frames, are designed to avoid the "3 strikes in 24 hours" business rules in authentication applications and the more complex analysis of log analytics / SIEM platforms. Batch solutions by definition cannot react until after a compromise has occurred while all real-time solutions impose time windows -- any data falling outside these rolling windows, no matter how important, is simply...

read more
Financial Fraud Detection

Financial Fraud Detection

The Problem Financial fraud detection requires monitoring billions of transactions, devices and users in real-time for suspect behaviors without false positives that alienate customers when service is denied in the middle of a foreign vacation or late night business event. The Solution What is needed is a system that do four things: detect complex patterns of behavior combine multiple sources and scale up to millions of events/sec take the appropriate, user-specified action when patterns are...

read more