SlideShare a Scribd company logo
1 of 29
Download to read offline
1
The Mobile Device:
The New Center of
the Fraud Prevention
Universe
F E B R U A R Y | 2 0 1 7
2
EDDIE GLENN
P R O D U C T M A R K E T I N G M A N A G E R , I O V A T I O N
JULIE CONROY
R E S E A R C H D I R E C T O R / A I T E G R O U P
AGENDA
3
n Findings from Aite research
n Mobile device as a solution
n Use cases
n Concluding remarks
4
Source:
Informationisbeautiful.net
5
$392 $420
$644
$760
$844
$903
$966
$1,091
2013 2014 2015 e2016 e2017 e2018 e2019 e2020
U.S. Account Takeover Losses, 2013 to e2020 (US$ Millions)
ATO IS ON THE RISE IN MANY MARKETS
Source: Aite Group, 2016
Source: Financial Fraud
Action UK, 2016
6
COMPROMISED DATA IS QUICKLY SOLD
7
CREDENTIALS GARNER A PREMIUM IN THE UNDERWEB
$3.78$6.43 $3.02 $0.22
Source: Trend Micro, 2016
8
BUSINESSES MUST BE AS NIMBLE AS THE CRIMINALS
9
UNDERSTANDING THE CUSTOMER’S
DIGITAL IDENTITY IS CRUCIAL
10
MOBILE TO THE RESCUE
6%
23%
30%
42%
51%
Healthcare
Public sector
Travel
Financial services
Retail
Mobile as a Percentage of All Transactions by Industry
Source: iovation, 2017
CONSUMERS WITH A
SMARTPHONE:
n 72% of U.S. Consumers
n 68% of U.K. Consumers
n 67% of Canadian Consumers
11
MOBILE: THE CENTER OF THE
FRAUD PREVENTION UNIVERSE
12
MOBILE AS AN
EXTENSION OF
IDENTITY
• Verify that device has
not been compromised
• Is device reporting
truthful answers?
• Have a comprehensive
fraud prevention and
authentication strategy
13
IS YOUR
MOBILE APP
REALLY SAFE?
Security risks for Android
are especially concerning
• 2M new strains of
Android malware
• Android has 78% market
share
Severe issues with Android's current
fingerprint scanning framework
Bypass built in security measures; is
your app still safeguarded?
Downloading apps from non-official
stores put user credentials of your app
at risk
Sideloading
Android rooting
Fingerprint hijacking
14
Is the
mobile
device
telling you
the truth?Hardware ID such as IMEIs may not be
unique, available, or even accurate. Device
recognition requires a fabric of attributes.
Native geolocation can be bypassed and
overridden easily. Other devices signals can
indicate its validity.
Geo-location
Is the device ID really static and
persistent?
Is your app really running on
a mobile emulator or VM?
Emulators, VMs?
15
MOBILE FRAUD BEHAVIOR
Thwarted
Recent Attacks
Mobile Emulator
Global Carriers
w/ Highest
Cases Of Fraud
• ATO using
Jailbroken iPad
• Evasion using ultra
cheap Android
phones
• 0.001% of mobile
traffic
• 50% confirmed
fraudulent
• tiGo (Ghana),
• MTN (Nigeria,
Ghana),
• Kcell (Kazakhstan),
• MegaFon (Russia)
16
EVASION
IDENTIFICATION
JAILBROKENGEOLOCATION
SECURITY RISK
ASSOCIATIONS
UNKNOWN DEVICE AUTHENTICATED
The Building Blocks
for a device
intelligence solution
17
n Use a fabric of
geolocation attributes to
determine true location
n Detect jailbroken/corrupt
devices and don’t trust
geolocation info from
them
GEOLOCATION
18
n Use a fabric of device identifiers, not
just one
n Comprehensive device identification
– all types of devices
n Keep device identification separate
from personal identification
n Readily identify relationships
between devices
MOBILE DEVICE IDENTIFICATION & ASSOCIATIONS
19
n Look for behavioral indicators:
n Past evidence of fraud
n Associated with other devices/accounts that are known fraudulent
n Frequent account creation
n Frequent account access
n Evading detection (TOR, Proxy)
n Look for device risk indicators:
n Geo-location attributes mismatch
n Jailbroken/rooted
n Device attributes mismatch
n Unsafe ISP, IP, country
Security risks, evasion, jailbroken
3 STEPS
For building an online fraud prevention &
authentication strategy
21
#1
Keep it frictionless for your users
22
#2
Have a
comprehensive &
consistent online
protection strategy
§ Fraudsters look for all points of
vulnerabilities
§ Plug one hole and fraudsters will
look for another (e.g. what
happened to CNP fraud when EMV
was introduced?)
§ Desktop web/apps
AND mobile web/
apps
§ Fraud prevention
AND authentication
23
DEVICE-BASED AUTHENTICATION
SERVICE
CUSTOMIZABLE
MULTIFACTOR
AUTHENTICATION
GROUP
AUTHORIZATION
#3:
Scale the level of
authentication as
transaction
risk increases
24
IOVATION SOLUTIONS
IOVATION INTELLIGENCE CENTER
GLOBAL DEVICE INTELLIGENCE PLATFORM
Device
Recognition
Device
Associations
Contributed
Evidence
Deep
Analytics
Machine
Learning
ProductsPlatform
Dynamic
Authentication Suite
Multi-factor security with exceptional user experience
ClearKey LaunchKey MFA
Fraud
Prevention Suite
Stop online fraud and abuse in real-time
Fraud
Prevention
SureScore
25
Use cases
26
BUILD YOUR SECURITY WITH THE ASSUMPTION
that the bad guys will breach the perimeter.
27
G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S
RESOURCES
Fraud Prevention Data Sheet
iovation Fraud Prevention stops online
and mobile fraud in real time.
AITE REPORT: THE MOBILE DEVICE
The full report on customer experiences
and the role that mobile plays.
28
Thank you.
Julie Conroy| Research Director
O: +1.617.398.5045
jconroy@aitegroup.com
Aite Group is a global research and advisory firm
delivering comprehensive, actionable advice on
business, technology, and regulatory issues and their
impact on the financial services industry. With
expertise in banking, payments, insurance, wealth
management, and the capital markets, we guide
financial institutions, technology providers, and
consulting firms worldwide. We partner with our
clients, revealing their blind spots and delivering
insights to make their businesses smarter and
stronger.
Visit us on the Web and connect with us on Twitter
and LinkedIn.
Q&A

More Related Content

What's hot

Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product BrochureBen Massey
 
Mobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CaseMobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CasemotionQR
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...Cristian Garcia G.
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12Aman Raj
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 

What's hot (11)

iFalcon Face Control Mobile
iFalcon Face Control MobileiFalcon Face Control Mobile
iFalcon Face Control Mobile
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
 
Mobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CaseMobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use Case
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
GPS DEVICE AND ID CARD Manufacturer
GPS DEVICE AND ID CARD ManufacturerGPS DEVICE AND ID CARD Manufacturer
GPS DEVICE AND ID CARD Manufacturer
 
Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 

Viewers also liked

Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...
Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...
Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...Kevin Earl Dayhoff
 
Textile Industry
Textile IndustryTextile Industry
Textile Industryjapji singh
 
вдв 03 (717)
вдв 03 (717)вдв 03 (717)
вдв 03 (717)vdv_volsk
 
Riesgos laborales, cuadro descriptivo
Riesgos laborales, cuadro descriptivoRiesgos laborales, cuadro descriptivo
Riesgos laborales, cuadro descriptivoLuis Chirinos
 
Ley organica del_trabajo_los_trabajadores_y_las_trabajadoras
Ley organica del_trabajo_los_trabajadores_y_las_trabajadorasLey organica del_trabajo_los_trabajadores_y_las_trabajadoras
Ley organica del_trabajo_los_trabajadores_y_las_trabajadorasJoel F. Guzmán Nuñez
 
Anxiety Disorder
Anxiety DisorderAnxiety Disorder
Anxiety DisorderAmor Amore
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
CECAFÉ - Relatório Mensal FEVEREIRO 2017
CECAFÉ - Relatório Mensal FEVEREIRO 2017CECAFÉ - Relatório Mensal FEVEREIRO 2017
CECAFÉ - Relatório Mensal FEVEREIRO 2017Luiz Valeriano
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Viewers also liked (12)

Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...
Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...
Fire in the 200 block of E. Main St. in Westminster on Sunday evening Septemb...
 
AdditionalExperience
AdditionalExperienceAdditionalExperience
AdditionalExperience
 
Textile Industry
Textile IndustryTextile Industry
Textile Industry
 
вдв 03 (717)
вдв 03 (717)вдв 03 (717)
вдв 03 (717)
 
Riesgos laborales, cuadro descriptivo
Riesgos laborales, cuadro descriptivoRiesgos laborales, cuadro descriptivo
Riesgos laborales, cuadro descriptivo
 
Ley organica del_trabajo_los_trabajadores_y_las_trabajadoras
Ley organica del_trabajo_los_trabajadores_y_las_trabajadorasLey organica del_trabajo_los_trabajadores_y_las_trabajadoras
Ley organica del_trabajo_los_trabajadores_y_las_trabajadoras
 
Paralelismo moises e Jesus
Paralelismo moises e JesusParalelismo moises e Jesus
Paralelismo moises e Jesus
 
2016 11-11_TSRI News Release
2016 11-11_TSRI News Release2016 11-11_TSRI News Release
2016 11-11_TSRI News Release
 
Anxiety Disorder
Anxiety DisorderAnxiety Disorder
Anxiety Disorder
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
CECAFÉ - Relatório Mensal FEVEREIRO 2017
CECAFÉ - Relatório Mensal FEVEREIRO 2017CECAFÉ - Relatório Mensal FEVEREIRO 2017
CECAFÉ - Relatório Mensal FEVEREIRO 2017
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Similar to Mobile Device Fraud Prevention

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsCybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsTony Chew
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_uslinkedinbeam
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovationTransUnion
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Vikalp Sharma
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&ANick Normile
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 

Similar to Mobile Device Fraud Prevention (20)

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsCybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_us
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovation
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Currency
CurrencyCurrency
Currency
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?TransUnion
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 

Recently uploaded

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Mobile Device Fraud Prevention

  • 1. 1 The Mobile Device: The New Center of the Fraud Prevention Universe F E B R U A R Y | 2 0 1 7
  • 2. 2 EDDIE GLENN P R O D U C T M A R K E T I N G M A N A G E R , I O V A T I O N JULIE CONROY R E S E A R C H D I R E C T O R / A I T E G R O U P
  • 3. AGENDA 3 n Findings from Aite research n Mobile device as a solution n Use cases n Concluding remarks
  • 5. 5 $392 $420 $644 $760 $844 $903 $966 $1,091 2013 2014 2015 e2016 e2017 e2018 e2019 e2020 U.S. Account Takeover Losses, 2013 to e2020 (US$ Millions) ATO IS ON THE RISE IN MANY MARKETS Source: Aite Group, 2016 Source: Financial Fraud Action UK, 2016
  • 6. 6 COMPROMISED DATA IS QUICKLY SOLD
  • 7. 7 CREDENTIALS GARNER A PREMIUM IN THE UNDERWEB $3.78$6.43 $3.02 $0.22 Source: Trend Micro, 2016
  • 8. 8 BUSINESSES MUST BE AS NIMBLE AS THE CRIMINALS
  • 10. 10 MOBILE TO THE RESCUE 6% 23% 30% 42% 51% Healthcare Public sector Travel Financial services Retail Mobile as a Percentage of All Transactions by Industry Source: iovation, 2017 CONSUMERS WITH A SMARTPHONE: n 72% of U.S. Consumers n 68% of U.K. Consumers n 67% of Canadian Consumers
  • 11. 11 MOBILE: THE CENTER OF THE FRAUD PREVENTION UNIVERSE
  • 12. 12 MOBILE AS AN EXTENSION OF IDENTITY • Verify that device has not been compromised • Is device reporting truthful answers? • Have a comprehensive fraud prevention and authentication strategy
  • 13. 13 IS YOUR MOBILE APP REALLY SAFE? Security risks for Android are especially concerning • 2M new strains of Android malware • Android has 78% market share Severe issues with Android's current fingerprint scanning framework Bypass built in security measures; is your app still safeguarded? Downloading apps from non-official stores put user credentials of your app at risk Sideloading Android rooting Fingerprint hijacking
  • 14. 14 Is the mobile device telling you the truth?Hardware ID such as IMEIs may not be unique, available, or even accurate. Device recognition requires a fabric of attributes. Native geolocation can be bypassed and overridden easily. Other devices signals can indicate its validity. Geo-location Is the device ID really static and persistent? Is your app really running on a mobile emulator or VM? Emulators, VMs?
  • 15. 15 MOBILE FRAUD BEHAVIOR Thwarted Recent Attacks Mobile Emulator Global Carriers w/ Highest Cases Of Fraud • ATO using Jailbroken iPad • Evasion using ultra cheap Android phones • 0.001% of mobile traffic • 50% confirmed fraudulent • tiGo (Ghana), • MTN (Nigeria, Ghana), • Kcell (Kazakhstan), • MegaFon (Russia)
  • 16. 16 EVASION IDENTIFICATION JAILBROKENGEOLOCATION SECURITY RISK ASSOCIATIONS UNKNOWN DEVICE AUTHENTICATED The Building Blocks for a device intelligence solution
  • 17. 17 n Use a fabric of geolocation attributes to determine true location n Detect jailbroken/corrupt devices and don’t trust geolocation info from them GEOLOCATION
  • 18. 18 n Use a fabric of device identifiers, not just one n Comprehensive device identification – all types of devices n Keep device identification separate from personal identification n Readily identify relationships between devices MOBILE DEVICE IDENTIFICATION & ASSOCIATIONS
  • 19. 19 n Look for behavioral indicators: n Past evidence of fraud n Associated with other devices/accounts that are known fraudulent n Frequent account creation n Frequent account access n Evading detection (TOR, Proxy) n Look for device risk indicators: n Geo-location attributes mismatch n Jailbroken/rooted n Device attributes mismatch n Unsafe ISP, IP, country Security risks, evasion, jailbroken
  • 20. 3 STEPS For building an online fraud prevention & authentication strategy
  • 21. 21 #1 Keep it frictionless for your users
  • 22. 22 #2 Have a comprehensive & consistent online protection strategy § Fraudsters look for all points of vulnerabilities § Plug one hole and fraudsters will look for another (e.g. what happened to CNP fraud when EMV was introduced?) § Desktop web/apps AND mobile web/ apps § Fraud prevention AND authentication
  • 24. 24 IOVATION SOLUTIONS IOVATION INTELLIGENCE CENTER GLOBAL DEVICE INTELLIGENCE PLATFORM Device Recognition Device Associations Contributed Evidence Deep Analytics Machine Learning ProductsPlatform Dynamic Authentication Suite Multi-factor security with exceptional user experience ClearKey LaunchKey MFA Fraud Prevention Suite Stop online fraud and abuse in real-time Fraud Prevention SureScore
  • 26. 26 BUILD YOUR SECURITY WITH THE ASSUMPTION that the bad guys will breach the perimeter.
  • 27. 27 G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S RESOURCES Fraud Prevention Data Sheet iovation Fraud Prevention stops online and mobile fraud in real time. AITE REPORT: THE MOBILE DEVICE The full report on customer experiences and the role that mobile plays.
  • 28. 28 Thank you. Julie Conroy| Research Director O: +1.617.398.5045 jconroy@aitegroup.com Aite Group is a global research and advisory firm delivering comprehensive, actionable advice on business, technology, and regulatory issues and their impact on the financial services industry. With expertise in banking, payments, insurance, wealth management, and the capital markets, we guide financial institutions, technology providers, and consulting firms worldwide. We partner with our clients, revealing their blind spots and delivering insights to make their businesses smarter and stronger. Visit us on the Web and connect with us on Twitter and LinkedIn.
  • 29. Q&A