SlideShare a Scribd company logo
1 of 4
Download to read offline
Copyright © Webroot Inc. > April 2015	 1
Anti-Fraud Solutions for
Financial Services
Secure customer transactions across digital channels
OVERVIEW
»» Cybercriminals focus on finance and e-commerce providers and their users.
»» Users are the weakest link. Social engineering tactics steal company
and personal data.
»» Traditional security cannot keep up with the volume, variety and
velocity of today’s threats.
»» With our smarter approach, Webroot keeps users safe anywhere and on
any device.
»» Webroot delivers advanced online fraud prevention for PCs and mobile
devices.
»» Webroot offers lightweight, powerful and interoperable solutions for
banks looking to protect themselves and their customers from banking
malware and internet attacks.
INTRODUCTION
The impact of today’s organized cybercrime is felt across the financial
and e-commerce sectors the world over. As more people access
financial services and accounts from personal devices, service
providers and their users have become the primary targets for online
fraud. Gartner research shows that more than 50% of online attacks
are aimed at users of financial and e-commerce services. That
research confirms that people continue to be the weakest link in the
security chain, and predicts that distributed denial of service (DDoS)
and criminal social engineering scams, such as spear phishing, have
reached new levels of prevalence and deviousness. Every day, newer
and more inventive scams trick people into handing over their financial
and personal information, while the security industry fails to provide
effective solutions to these problems.
of online attacks target banks and
e-commerce users. –Gartner Research, 2013
DATASHEET > ANTI-FRAUD SOLUTIONS
DATASHEET 	 ANTI-FRAUD SOLUTIONS
2 	 Copyright © Webroot Inc. > April 2015
BIG DATA AND THE 				
WEBROOT®
INTELLIGENCE NETWORK (WIN)
At more than 60 million unique variants per year, the volume, variety,
and velocity of malware flooding the internet and the numerous ways in
which we connect to it is staggering. The only way to keep up is to leave
traditional methods behind and analyze huge data sets in real time in
the cloud, then use this data to not only detect, but predict and prevent
attacks.
Big data lets us discover malware as soon as it tries to infect a user,
and then protect all other users against such attacks without the
hassle of time-consuming signature updates. The Webroot Intelligence
Network (Figure 1) integrates billions of pieces of information from
multiple sources – including data from customers, test laboratories,
and intelligence shared between security vendors – to create a massive
malware detection net. Unique URL and IP data feeds from strategic
partners further enrich our collective intelligence. Each time an endpoint
is added anywhere in the world, Webroot SecureAnywhere®
protection
becomes more powerful and effective.
SOLUTIONS FOR FINANCIAL INSTITUTIONS
Financial institutions are attacked from three different angles: online and
mobile banking, unsecured employee devices, and network assaults.
Banks need smarter solutions that provide coverage across all three
threat vectors. Webroot offers a portfolio of products that protect bank
customers, employees, and networks.
Advanced Online Fraud Prevention —		
Protecting Customers in Real-time
Customer devices constitute a major point of weakness for a banking
institution, and cybercriminals aim to compromise them. Research shows
that even customers with security software installed are at risk of fraud
and identity theft. The volume and sophistication of modern malware is
often too complex for traditional antivirus solutions to provide adequate
protection. Banks need a balanced solution that protects their customers
without impacting user experience.
Our advanced online fraud prevention utilizes SecureAnywhere™
technology for PCs and mobile devices to provide a safe online and mobile
banking experience. Using the industry’s smallest and fastest client
technology, Webroot offers identity protection, secure browsing, anti-
phishing, and credential management, even if a customer’s PC or mobile
device is infected.
Webroot SecureAnywhere® AntiVirus
— Online Banking for PC and Mobile
Banks and their customers are attractive targets for fraudsters looking to
compromise customers’ devices and capture personal information. The
challenge for bankers is the lack of visibility and control over customers’
computers. In addition, traditional antivirus is failing to adequately protect
customers against the volume and range of threats that now exist.
Banks need to balance solutions that protect their customers but don’t
negatively impact online experience. Lightweight, powerful, intelligent
and interoperable Webroot solutions are the perfect fit for banks looking
to protect themselves and their customers from banking malware and
internet attack.
Webroot SecureAnywhere®
AntiVirus detects, removes and protects
against malware in real time. Additionally, the Identity Shield secures
browsing, while anti-phishing and credential protection secure online
banking sessions, even if the customer’s device is infected.
Figure 1: Webroot®
Intelligence Network
DATASHEET 	 ANTI-FRAUD SOLUTIONS
Copyright © Webroot Inc. > April 2015	 3
Features
»» Downloads and installs in seconds
»» Ultra-fast scan times, first scan <2 mins, subsequent scans ~	
20 secs
»» Small footprint on the device, won’t impact performance
»» All users are instantly protected in real time, no configuration
required and no need to download signature updates
»» Specializes in detecting and removing zero day malware and 	
targeted attacks
»» Remediates infections quickly and thoroughly
»» Integrated secure browsing and real-time anti-phishing
»» Works alongside existing security solutions
»» Supports multiple devices (PC, Android™ and iOS®
smartphones 	
and tablets)
»» Supports multiple languages
»» 24/7 online customer support provided by Webroot
Providing Webroot SecureAnywhere®
AntiVirus free to banking customers
or promoting this security solution has proven to be a successful strategy
for progressive banks. A dramatic reduction in fraud can occur in a few
weeks after the launch of the antivirus. Vulnerable users, those most
prone to downloading malware, are typically early adopters (Figure 2).
Approximately 64% of computers are infected, despite having an
antivirus solution. In fact, nearly 20% of computers with antivirus
software installed are infected per week. That’s why Webroot
SecureAnywhere AntiVirus was designed to run alongside existing
security software without conflicts, providing a comprehensive, layered
protection approach.
Web Access Intelligence — Online Banking Visibility
Paired with Webroot SecureAnywhere AntiVirus, Web Access Intelligence
(WAI) provides another powerful layer of defense. When Webroot
SecureAnywhere AntiVirus is installed on the customers’ computer, WAI
will deliver the following information:
»» Who is logging in to online banking
»» Which device they are using
»» Whether Webroot protection is installed
»» The security status of the device
»» Whether antivirus protection is up to date
»» Whether the device is infected and what it is infected with
This intelligence allows the bank to block or restrict online banking
access, or offer the customer Webroot SecureAnywhere AntiVirus to
address issues and improve the security on their computer (Figure 3).
Mobile Security SDK Protection — Mobile Banking
Securing mobile banking presents new challenges, such as less
authentication, data sharing, using public Wi-Fi, downloading of third
party apps, and device and data loss. But ensuring the mobile banking
experience is protected without affecting the user experience is an
attainable goal.
The Webroot®
Mobile Security SDK is designed to embed security within a
mobile banking app. No customer intervention is required. Silent, running
in the background and without impacting the customer’s device, the
Mobile Security SDK delivers real-time threat intelligence to the bank for
instant analysis, interrogation, and action.
Figure 2: Fraud attempts data derived from installations on fraud-suspected devices. Adoption rate
data derived from activations of Webroot®
licenses by banking customers.
LaunchWeek1Week2Week3Week4Week5Week6Week7Week8Week9Week10Week11Week12Week13Week14Week15Week16Week17Week18Week19Week20Week21Week22Week23
Fraud Instances
Webroot Adoption Rate
Figure 3: Fraud attempts data derived from installations on fraud-suspected devices. Adoption rate
data derived from activations of Webroot®
licenses by banking customers.
DATASHEET 	 ANTI-FRAUD SOLUTIONS
4 	 Copyright © Webroot Inc. > April 2015
Additionally, the SDK includes a powerful, yet flexible, risk scoring
mechanism to simplify the decision making process when assessing risks
on a mobile device. Banks have the option of weighting risk scores or
using the simple traffic light red-yellow-green risk assessment. Integration
of the SDK into the mobile banking app is quick and easy, and can be
implemented within weeks.
The Mobile Security SDK creates a unique device ID for each customer
device as secondary authentication. Additional information reported
includes: rooted/jailbroken status, applications running, presence of a
keyboard running, if the device is running in an emulator, geo location,
network information, and much more, all to assess the status of the
mobile device (Figure 4).
© 2015 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, Webroot Intelligence Network, and WIN are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. Microsoft, Windows,
Windows Vista, and Internet Explorer are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Mozilla and Firefox are registered trademarks of the Mozilla Foundation. All other trademarks are properties
of their respective owners.
World Headquarters
385 Interlocken Crescent
Suite 800
Broomfield, Colorado 80021 USA
+1 800 772 9383
Webroot EMEA
6th floor, Block A
1 George’s Quay Plaza
George’s Quay, Dublin 2, Ireland
+44 (0) 870 1417 070
Webroot APAC
Suite 1402, Level 14, Tower A
821 Pacific Highway
Chatswood, NSW 2067, Australia
+61 (0) 2 8071 1900
About Webroot
Webroot provides smarter cybersecurity that harnesses collective threat intelligence to protect the Internet of Everything. We protect consumers, businesses and technology providers from malware
and other cyber-attacks using a cloud-based threat intelligence network. Computers, tablets, smartphones and the Internet of Things can be secured by our award-winning SecureAnywhere®
and
BrightCloud®
products. Webroot protects over 30 million devices and is trusted by over 35 financial institutions and subsidiaries, as well as market-leading technology companies, including Cisco,
F5 Networks, HP, Microsoft, Palo Alto Networks, and RSA. Webroot is headquartered in Colorado and operates globally across North America, Europe and the Asia Pacific region. Discover smarter
cybersecurity at www.webroot.com and www.brightcloud.com
Mobile banking is a critical account access method for active, profitable
customers. Embedding the power of mobile security into the mobile
banking app provides the information banks need to manage risk.
Summary
For banking and e-commerce providers, maintaining the trust and
confidence of customers and employees is critical, so providing the
best possible security is paramount. Over 35 financial institutions and
subsidiaries worldwide utilize smarter cybersecurity from Webroot
to improve their online and mobile banking protection, safeguard
their customers, and gain access to critical security intelligence to
mitigate fraud losses. Our cloud-based, collective threat intelligence
are designed to address the challenges of banking and e-commerce
providers everywhere, ensuring that your customers, employees, and
networks are secure.
Figure 4: Mobile Security SDK for banking

More Related Content

What's hot

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Brian Bissett
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloudUlf Mattsson
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperNetIQ
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 

What's hot (19)

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 

Viewers also liked

Dr Dinev's3d modelinkrakow sept2011
Dr Dinev's3d modelinkrakow sept2011 Dr Dinev's3d modelinkrakow sept2011
Dr Dinev's3d modelinkrakow sept2011 Iepi Net
 
Risk management benchmarking 2013
Risk management benchmarking 2013Risk management benchmarking 2013
Risk management benchmarking 2013Nidhi Gupta
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud programchris75308
 
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...Mary Inman
 
Python for Financial Data Analysis with pandas
Python for Financial Data Analysis with pandasPython for Financial Data Analysis with pandas
Python for Financial Data Analysis with pandasWes McKinney
 

Viewers also liked (6)

Dr Dinev's3d modelinkrakow sept2011
Dr Dinev's3d modelinkrakow sept2011 Dr Dinev's3d modelinkrakow sept2011
Dr Dinev's3d modelinkrakow sept2011
 
Risk management benchmarking 2013
Risk management benchmarking 2013Risk management benchmarking 2013
Risk management benchmarking 2013
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
 
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
Anti-Fraud Challenges for 2013 (Presented at HCCA Managed Care Compliance Con...
 
Doc procurement anti fraud and anti-corruption
Doc procurement anti fraud and anti-corruptionDoc procurement anti fraud and anti-corruption
Doc procurement anti fraud and anti-corruption
 
Python for Financial Data Analysis with pandas
Python for Financial Data Analysis with pandasPython for Financial Data Analysis with pandas
Python for Financial Data Analysis with pandas
 

Similar to Anti-Fraud Datasheet

Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
ResearchProjectComplete
ResearchProjectCompleteResearchProjectComplete
ResearchProjectCompletedannyboi17
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital LifeSoftwareDeals
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issueSonaliG6
 
Security and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesSecurity and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesZoe Gilbert
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxmalbert5
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 

Similar to Anti-Fraud Datasheet (20)

Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Ijetr042177
Ijetr042177Ijetr042177
Ijetr042177
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
ResearchProjectComplete
ResearchProjectCompleteResearchProjectComplete
ResearchProjectComplete
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
Security and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesSecurity and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devices
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

Anti-Fraud Datasheet

  • 1. Copyright © Webroot Inc. > April 2015 1 Anti-Fraud Solutions for Financial Services Secure customer transactions across digital channels OVERVIEW »» Cybercriminals focus on finance and e-commerce providers and their users. »» Users are the weakest link. Social engineering tactics steal company and personal data. »» Traditional security cannot keep up with the volume, variety and velocity of today’s threats. »» With our smarter approach, Webroot keeps users safe anywhere and on any device. »» Webroot delivers advanced online fraud prevention for PCs and mobile devices. »» Webroot offers lightweight, powerful and interoperable solutions for banks looking to protect themselves and their customers from banking malware and internet attacks. INTRODUCTION The impact of today’s organized cybercrime is felt across the financial and e-commerce sectors the world over. As more people access financial services and accounts from personal devices, service providers and their users have become the primary targets for online fraud. Gartner research shows that more than 50% of online attacks are aimed at users of financial and e-commerce services. That research confirms that people continue to be the weakest link in the security chain, and predicts that distributed denial of service (DDoS) and criminal social engineering scams, such as spear phishing, have reached new levels of prevalence and deviousness. Every day, newer and more inventive scams trick people into handing over their financial and personal information, while the security industry fails to provide effective solutions to these problems. of online attacks target banks and e-commerce users. –Gartner Research, 2013 DATASHEET > ANTI-FRAUD SOLUTIONS
  • 2. DATASHEET ANTI-FRAUD SOLUTIONS 2 Copyright © Webroot Inc. > April 2015 BIG DATA AND THE WEBROOT® INTELLIGENCE NETWORK (WIN) At more than 60 million unique variants per year, the volume, variety, and velocity of malware flooding the internet and the numerous ways in which we connect to it is staggering. The only way to keep up is to leave traditional methods behind and analyze huge data sets in real time in the cloud, then use this data to not only detect, but predict and prevent attacks. Big data lets us discover malware as soon as it tries to infect a user, and then protect all other users against such attacks without the hassle of time-consuming signature updates. The Webroot Intelligence Network (Figure 1) integrates billions of pieces of information from multiple sources – including data from customers, test laboratories, and intelligence shared between security vendors – to create a massive malware detection net. Unique URL and IP data feeds from strategic partners further enrich our collective intelligence. Each time an endpoint is added anywhere in the world, Webroot SecureAnywhere® protection becomes more powerful and effective. SOLUTIONS FOR FINANCIAL INSTITUTIONS Financial institutions are attacked from three different angles: online and mobile banking, unsecured employee devices, and network assaults. Banks need smarter solutions that provide coverage across all three threat vectors. Webroot offers a portfolio of products that protect bank customers, employees, and networks. Advanced Online Fraud Prevention — Protecting Customers in Real-time Customer devices constitute a major point of weakness for a banking institution, and cybercriminals aim to compromise them. Research shows that even customers with security software installed are at risk of fraud and identity theft. The volume and sophistication of modern malware is often too complex for traditional antivirus solutions to provide adequate protection. Banks need a balanced solution that protects their customers without impacting user experience. Our advanced online fraud prevention utilizes SecureAnywhere™ technology for PCs and mobile devices to provide a safe online and mobile banking experience. Using the industry’s smallest and fastest client technology, Webroot offers identity protection, secure browsing, anti- phishing, and credential management, even if a customer’s PC or mobile device is infected. Webroot SecureAnywhere® AntiVirus — Online Banking for PC and Mobile Banks and their customers are attractive targets for fraudsters looking to compromise customers’ devices and capture personal information. The challenge for bankers is the lack of visibility and control over customers’ computers. In addition, traditional antivirus is failing to adequately protect customers against the volume and range of threats that now exist. Banks need to balance solutions that protect their customers but don’t negatively impact online experience. Lightweight, powerful, intelligent and interoperable Webroot solutions are the perfect fit for banks looking to protect themselves and their customers from banking malware and internet attack. Webroot SecureAnywhere® AntiVirus detects, removes and protects against malware in real time. Additionally, the Identity Shield secures browsing, while anti-phishing and credential protection secure online banking sessions, even if the customer’s device is infected. Figure 1: Webroot® Intelligence Network
  • 3. DATASHEET ANTI-FRAUD SOLUTIONS Copyright © Webroot Inc. > April 2015 3 Features »» Downloads and installs in seconds »» Ultra-fast scan times, first scan <2 mins, subsequent scans ~ 20 secs »» Small footprint on the device, won’t impact performance »» All users are instantly protected in real time, no configuration required and no need to download signature updates »» Specializes in detecting and removing zero day malware and targeted attacks »» Remediates infections quickly and thoroughly »» Integrated secure browsing and real-time anti-phishing »» Works alongside existing security solutions »» Supports multiple devices (PC, Android™ and iOS® smartphones and tablets) »» Supports multiple languages »» 24/7 online customer support provided by Webroot Providing Webroot SecureAnywhere® AntiVirus free to banking customers or promoting this security solution has proven to be a successful strategy for progressive banks. A dramatic reduction in fraud can occur in a few weeks after the launch of the antivirus. Vulnerable users, those most prone to downloading malware, are typically early adopters (Figure 2). Approximately 64% of computers are infected, despite having an antivirus solution. In fact, nearly 20% of computers with antivirus software installed are infected per week. That’s why Webroot SecureAnywhere AntiVirus was designed to run alongside existing security software without conflicts, providing a comprehensive, layered protection approach. Web Access Intelligence — Online Banking Visibility Paired with Webroot SecureAnywhere AntiVirus, Web Access Intelligence (WAI) provides another powerful layer of defense. When Webroot SecureAnywhere AntiVirus is installed on the customers’ computer, WAI will deliver the following information: »» Who is logging in to online banking »» Which device they are using »» Whether Webroot protection is installed »» The security status of the device »» Whether antivirus protection is up to date »» Whether the device is infected and what it is infected with This intelligence allows the bank to block or restrict online banking access, or offer the customer Webroot SecureAnywhere AntiVirus to address issues and improve the security on their computer (Figure 3). Mobile Security SDK Protection — Mobile Banking Securing mobile banking presents new challenges, such as less authentication, data sharing, using public Wi-Fi, downloading of third party apps, and device and data loss. But ensuring the mobile banking experience is protected without affecting the user experience is an attainable goal. The Webroot® Mobile Security SDK is designed to embed security within a mobile banking app. No customer intervention is required. Silent, running in the background and without impacting the customer’s device, the Mobile Security SDK delivers real-time threat intelligence to the bank for instant analysis, interrogation, and action. Figure 2: Fraud attempts data derived from installations on fraud-suspected devices. Adoption rate data derived from activations of Webroot® licenses by banking customers. LaunchWeek1Week2Week3Week4Week5Week6Week7Week8Week9Week10Week11Week12Week13Week14Week15Week16Week17Week18Week19Week20Week21Week22Week23 Fraud Instances Webroot Adoption Rate Figure 3: Fraud attempts data derived from installations on fraud-suspected devices. Adoption rate data derived from activations of Webroot® licenses by banking customers.
  • 4. DATASHEET ANTI-FRAUD SOLUTIONS 4 Copyright © Webroot Inc. > April 2015 Additionally, the SDK includes a powerful, yet flexible, risk scoring mechanism to simplify the decision making process when assessing risks on a mobile device. Banks have the option of weighting risk scores or using the simple traffic light red-yellow-green risk assessment. Integration of the SDK into the mobile banking app is quick and easy, and can be implemented within weeks. The Mobile Security SDK creates a unique device ID for each customer device as secondary authentication. Additional information reported includes: rooted/jailbroken status, applications running, presence of a keyboard running, if the device is running in an emulator, geo location, network information, and much more, all to assess the status of the mobile device (Figure 4). © 2015 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, Webroot Intelligence Network, and WIN are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. Microsoft, Windows, Windows Vista, and Internet Explorer are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Mozilla and Firefox are registered trademarks of the Mozilla Foundation. All other trademarks are properties of their respective owners. World Headquarters 385 Interlocken Crescent Suite 800 Broomfield, Colorado 80021 USA +1 800 772 9383 Webroot EMEA 6th floor, Block A 1 George’s Quay Plaza George’s Quay, Dublin 2, Ireland +44 (0) 870 1417 070 Webroot APAC Suite 1402, Level 14, Tower A 821 Pacific Highway Chatswood, NSW 2067, Australia +61 (0) 2 8071 1900 About Webroot Webroot provides smarter cybersecurity that harnesses collective threat intelligence to protect the Internet of Everything. We protect consumers, businesses and technology providers from malware and other cyber-attacks using a cloud-based threat intelligence network. Computers, tablets, smartphones and the Internet of Things can be secured by our award-winning SecureAnywhere® and BrightCloud® products. Webroot protects over 30 million devices and is trusted by over 35 financial institutions and subsidiaries, as well as market-leading technology companies, including Cisco, F5 Networks, HP, Microsoft, Palo Alto Networks, and RSA. Webroot is headquartered in Colorado and operates globally across North America, Europe and the Asia Pacific region. Discover smarter cybersecurity at www.webroot.com and www.brightcloud.com Mobile banking is a critical account access method for active, profitable customers. Embedding the power of mobile security into the mobile banking app provides the information banks need to manage risk. Summary For banking and e-commerce providers, maintaining the trust and confidence of customers and employees is critical, so providing the best possible security is paramount. Over 35 financial institutions and subsidiaries worldwide utilize smarter cybersecurity from Webroot to improve their online and mobile banking protection, safeguard their customers, and gain access to critical security intelligence to mitigate fraud losses. Our cloud-based, collective threat intelligence are designed to address the challenges of banking and e-commerce providers everywhere, ensuring that your customers, employees, and networks are secure. Figure 4: Mobile Security SDK for banking