ConfidentID Mobile User Authentication is a biometric-enabled authentication solution that uses multiple factors such as biometrics, passwords, and device location to securely identify customers conducting mobile or online banking transactions. It provides stronger authentication than single-factor options to reduce fraud and identity theft. Financial institutions can customize the authentication levels required based on transaction risk levels to balance security with convenience. The solution utilizes the capabilities of smartphones and tablets to deliver advanced authentication without additional hardware.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
Mobile banking (mbanking) has quietly emerged as a critical and inevitable weapon in the ongoing battle to retain customers and reduce expenses. Mobile transactional costs are lower than desktop transactions and represent the fastest growing portion of the consumer financial
service business. In fact, many customers will willingly switch allegiances to financial service institutions that offer the convenience and speed of mobile banking versus brick and mortar transactions only.
However, the precipitous rise in mobile financial service applications comes at a cost. Many consumers are skeptical that mobile platforms and mbanking applications are equipped with the proper security measures to turn their phone into a strong authentication device. As
younger generations demand expanded mobile financial service applications, the need for the industry to demonstrate a commitment to increasing the security of these transactions is rising rapidly.
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
Mobile devices have been targeted by cybercriminals for over seven years now. However, in 2014 things got serious. Cybercriminals realized that a major portion of eCommerce and online banking is moving to the mobile space, and with that companies are giving clients more options for larger transactions, and actions that were previously only performed on PCs. New PC grade malware appeared on mobile devices, some old PC tricks were transformed for mobile, and new mobile specific threats emerged. In this session we will analyze these threats using multiple customer case studies and Trusteer’s security team research data. We also take a look at the latest mobile threats, threats in development and mitigation tactics.
The importance of being human-centric instead of techno-centric is now fundamentally assessed in the context of secure digital identity for the financial services landscape.
Forward-looking banks and financial institutions are increasingly responding with resources and investments that deliver NEC’s state-of-the-art authentication methods
to meet consumer expectations. As a result, NEC’s vantage point goes far beyond cutting-edge technologies and solutions, such as integration of multimodal biometrics. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
Mobile Banking Security Risks and Consequences iovation2015TransUnion
View the recorded presentation: https://www.iovation.com/resources/webinars/mobile-banking-security-risks-consequences
Gain insight into the evolution of mobile banking and the risks that accompany this business channel.
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
Mobile banking (mbanking) has quietly emerged as a critical and inevitable weapon in the ongoing battle to retain customers and reduce expenses. Mobile transactional costs are lower than desktop transactions and represent the fastest growing portion of the consumer financial
service business. In fact, many customers will willingly switch allegiances to financial service institutions that offer the convenience and speed of mobile banking versus brick and mortar transactions only.
However, the precipitous rise in mobile financial service applications comes at a cost. Many consumers are skeptical that mobile platforms and mbanking applications are equipped with the proper security measures to turn their phone into a strong authentication device. As
younger generations demand expanded mobile financial service applications, the need for the industry to demonstrate a commitment to increasing the security of these transactions is rising rapidly.
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
Mobile devices have been targeted by cybercriminals for over seven years now. However, in 2014 things got serious. Cybercriminals realized that a major portion of eCommerce and online banking is moving to the mobile space, and with that companies are giving clients more options for larger transactions, and actions that were previously only performed on PCs. New PC grade malware appeared on mobile devices, some old PC tricks were transformed for mobile, and new mobile specific threats emerged. In this session we will analyze these threats using multiple customer case studies and Trusteer’s security team research data. We also take a look at the latest mobile threats, threats in development and mitigation tactics.
The importance of being human-centric instead of techno-centric is now fundamentally assessed in the context of secure digital identity for the financial services landscape.
Forward-looking banks and financial institutions are increasingly responding with resources and investments that deliver NEC’s state-of-the-art authentication methods
to meet consumer expectations. As a result, NEC’s vantage point goes far beyond cutting-edge technologies and solutions, such as integration of multimodal biometrics. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
Mobile Banking Security Risks and Consequences iovation2015TransUnion
View the recorded presentation: https://www.iovation.com/resources/webinars/mobile-banking-security-risks-consequences
Gain insight into the evolution of mobile banking and the risks that accompany this business channel.
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
Balancing Security and Customer ExperienceTransUnion
Using Device Insight to Balance Fraud Prevention and Customer Experience
Today, your customer’s device has become their proxy for a large percentage of their online retail and banking activity. By using insight from those devices, you can reduce risk and ensure a smooth experience along the entire customer journey.
In this webinar, you’ll learn from Max Anhoury, our VP of Global partnerships, about:
* Today’s fraud and security trends
* What a fraud ring looks like
* The evolving online experience with EMV
* How to create frictionless security across the consumer journey
Mobile Banking – A Transformation of Traditional BankingInfosys Finacle
www.infosys.com/finacle
How comfortable are we with Mobile Banking? Not very much, it seems. Even today, most of us who use mobile banking do so merely to check account information, transfer funds or pay bills. How many of us are aware of mobile technologies like Near Field Communication (NFC) and Remote Deposit Capture (RDC), which have evolved in response to customers’ need for a mechanism to make quick in-store/ transit purchases and check deposits without visiting a branch or an Internet banking site?
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
The financial services industry, like most businesses and consumers, has become dependent on mobile communications as a way to conduct business, manage customer information, exchange data, and work with customers. Due to its convenience, speed and ease, the electronic form of money has gained tremendous popularity among ordinary people and businesses
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
It is understood by studies that wireless data services is crucial for users to access locationbased services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the Location Based Services includes the services to identify the location of a person or object like searching of the nearest Banking, Cash Machine Receiving Alerts, Location Based Advertising etc. With the rapid adoption of mobile devices as a primary interface to network of services, there is a considerable risk with respect to authentication and authorization. To guard against risk, trustworthy authentication and secure communication are essential especially in Location Based Services. The purpose of this study is to identify security risks in mobile transactions specially in location based services like mobile banking. Current mobile banking authentication is challenging and identified as a major security risk. Identify the factors why customer distrusts mobile banking. Furthermore, identifying security issues between mobile devices and mobile banking systems. Finding which approach is more suitable and secure for mobile banking transaction between customer and bank.
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
With the growing threat and public concern around the use of legacy username/password mechanisms for authentication and authorisation, many are now turning to the mobile phone as a way of providing solutions that are convenient and provide peace of mind for the user as well as meeting the security requirements and expectations of both Service Providers and Government/Regulatory Bodies keen to protect the interests of citizens. We’ll look at the role the mobile phone (and mobile operator) can play in supporting a wide range of different use cases bringing together industry initiatives such as GSMA Mobile Connect and the FIDO Alliance.
An introduction to Solus - learn how Solus is combatting Cyber Crime and online security breaches with it's secure, easy-to-use, authentication platform. It's multifactor application uses biometric identification and scrambled pinpad technology and can be integrated with enterprise apps.
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Uniphore
This presentation intends to underline and correlate how Speech Recognition and Voice Biometrics can unearth and prevent online fraud while ensuring regulatory compliance during customer interactions.
Balancing Security and Customer ExperienceTransUnion
Using Device Insight to Balance Fraud Prevention and Customer Experience
Today, your customer’s device has become their proxy for a large percentage of their online retail and banking activity. By using insight from those devices, you can reduce risk and ensure a smooth experience along the entire customer journey.
In this webinar, you’ll learn from Max Anhoury, our VP of Global partnerships, about:
* Today’s fraud and security trends
* What a fraud ring looks like
* The evolving online experience with EMV
* How to create frictionless security across the consumer journey
Mobile Banking – A Transformation of Traditional BankingInfosys Finacle
www.infosys.com/finacle
How comfortable are we with Mobile Banking? Not very much, it seems. Even today, most of us who use mobile banking do so merely to check account information, transfer funds or pay bills. How many of us are aware of mobile technologies like Near Field Communication (NFC) and Remote Deposit Capture (RDC), which have evolved in response to customers’ need for a mechanism to make quick in-store/ transit purchases and check deposits without visiting a branch or an Internet banking site?
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
The financial services industry, like most businesses and consumers, has become dependent on mobile communications as a way to conduct business, manage customer information, exchange data, and work with customers. Due to its convenience, speed and ease, the electronic form of money has gained tremendous popularity among ordinary people and businesses
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
It is understood by studies that wireless data services is crucial for users to access locationbased services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the Location Based Services includes the services to identify the location of a person or object like searching of the nearest Banking, Cash Machine Receiving Alerts, Location Based Advertising etc. With the rapid adoption of mobile devices as a primary interface to network of services, there is a considerable risk with respect to authentication and authorization. To guard against risk, trustworthy authentication and secure communication are essential especially in Location Based Services. The purpose of this study is to identify security risks in mobile transactions specially in location based services like mobile banking. Current mobile banking authentication is challenging and identified as a major security risk. Identify the factors why customer distrusts mobile banking. Furthermore, identifying security issues between mobile devices and mobile banking systems. Finding which approach is more suitable and secure for mobile banking transaction between customer and bank.
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
With the growing threat and public concern around the use of legacy username/password mechanisms for authentication and authorisation, many are now turning to the mobile phone as a way of providing solutions that are convenient and provide peace of mind for the user as well as meeting the security requirements and expectations of both Service Providers and Government/Regulatory Bodies keen to protect the interests of citizens. We’ll look at the role the mobile phone (and mobile operator) can play in supporting a wide range of different use cases bringing together industry initiatives such as GSMA Mobile Connect and the FIDO Alliance.
An introduction to Solus - learn how Solus is combatting Cyber Crime and online security breaches with it's secure, easy-to-use, authentication platform. It's multifactor application uses biometric identification and scrambled pinpad technology and can be integrated with enterprise apps.
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Uniphore
This presentation intends to underline and correlate how Speech Recognition and Voice Biometrics can unearth and prevent online fraud while ensuring regulatory compliance during customer interactions.
The proliferation of mobile devices is front and center for organizations
in both employee and customer communities. Entrust not only helps secure mobile identities and transactions, but also empowers organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike.
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
The significance of a robust identity verification process cannot be overstated while businesses are struggling to deal with online frauds & thefts. The online transactions are growing continuously, ensuring safe and trusted user authentication becomes a mandatory concern for businesses and service providers. One key solution that takes center stage in this endeavor is online ID verification.
https://www.idmerit.com/blog/the-essence-of-online-id-verification-for-enhanced-user-authentication/
Using externally verified strong identities can reduce the risk of fraud and improve the customer experience in registering and engaging with your services.
Mobile phones are a quintessential part of our lives; they keep us connected with friends and family and make our lives more convenient every day. As the global Covid-19 pandemic encouraged people to remain safely indoors, there was a large increase in the number of Mobile Banking users. From depositing checks remotely to having 24*7 access to your bank account, the convenience and the utility of Mobile Banking are the reasons behind this popularity. And yet many people still wonder if Mobile Banking is Safe. If you are someone who is undecided about adopting Mobile Banking because of concerns about the security of Mobile Banking then here is the answer to your question ‘Are Mobile Banking Apps really safe?’ covered in this article. The best way to do this is to look at the risks involved with Mobile Banking and what organizations and customers can do about it.
Mobile Connect, an initiative by GSMA, has the potential to change online authentication and how we consume online services, on a global basis. This presentation will explain what Mobile Connect is, how it can benefit your organisation and the end users.
Procert Authentication as a Service provides a secure , frictionless, and cost-effective user identity and authentication management service on the cloud. Procert brings added convenience to enterprises through easy SDK/API integration on the cloud. But importantly it offers ease of use to end customers in terms of frictionless, yet secure, multi-factor authentication (SMS, Voice, WhatsApp) from anywhere and any device. No wonder more and more businesses are increasingly adopting Procert Authentication as a Service (AaaS)
Identity and Access Management Solutions for Financial InstitutionsAlireza Ghahrood
Key trusted identities solutions that provide a truly
secure and frictionless omni-channel experience
F I N D O U T M O R E >
Innovation that helps meet
compliance and enables
your digital business
Don’t let regulations and compliance
standards such as PSD2, PCI DSS, or
FFIEC hold you back. We reduce risk
and help you enable a secure digital
banking experience while addressing
Transaction verification and signing security compliance.
The increasing sophistication and frequency of fraudulent
attacks requires you to secure transactions with strong
authentication, without hindering the customer experience.
Our solutions will empower your customers to quickly and
easily verify transactions through mobile solutions such as
out-of-band mobile push notifications and mobile smart
credentials.
Advanced adaptive athentication
Consumers want a secure yet frictionless banking experience.
Adaptive authentication provides an innovative approach by
adding a transparent layer of security for your customers.
Assess a range of contextual attributes in real-time, and
provide deep security and identity insights during login.
This leads to fewer step-up challenges and help desk calls
and reduces the number of fraudulent transactions.
Device reputation
Ensure the integrity of your customer’s device before
they open an account, sign into their banking applications,
or conduct a transaction. Our device reputation solution
allows you to add a layer of security while reducing any
unnecessary customer involvement, providing a seamless
and transparent experience. By relying on multi-factor
authentication only when necessary, device reputation
allows your organization to balance usability and security.
Mobile innovations
Customers can now manage all of their banking needs
with the device they love most – their mobile device.
Mobile enables push notifications as well as transparent
authentication methods such as touch ID and facial
recognition
Identity as a Services in a Mobile World - David Harding CTO IWSincViolet Le, MBA MIS
Voice biometrics have an important role to play in securing mobile devices, applications and, eventually, transactions. Mobility is the other opportunity are where partnerships among technology and infrastructure providers are taking shape. As David Harding, chief technology officer and vice president of ImageWare Systems (IWS) suggests in this presentation at VBC-SF, the rapid proliferation of smartphones is driving demand for multi-modal biometrics. As Harding points out, people everywhere are using smartphones as convenient replacements for personal computers. Use cases span business, as well as personal applications creating an acute need for stronger authentication and assurance that the device has not fallen into the hands of a criminal. Harding observes that “multi-modal biometrics will become as ubiquitous as smartphones,” noting that the devices are always present and hooked-up to the Internet. More importantly, with their cameras, touch screens and fingerprint readers, Harding calls them “the perfect biometric capture device.”
Remote Identity Verification: The Ultimate GuideFTx Identity
Discover the power of remote identity verification and its numerous benefits. Explore how this cutting-edge technology works seamlessly to enhance security and streamline processes. Elevate your digital identity experience with our insightful guide.
The boundaries of the corporate network are being challenged. Today’s
enterprise is falling victim to unrelenting attacks that target physical and
logical infrastructures, mobile platforms, user identities, network devices
and more. Entrust provides more than a simple one-step means of protecting the
world’s largest and most respected enterprises. Reduce costs, defend
against targeted attacks and consolidate identity-based security via a
single management and strong authentication platform.
What is two factor or multi-factor authenticationJack Forbes
By adding risk-based authentication as a final security layer on top of your other MFA layers, adaptive MFA avoids annoying your customers, while keeping their data safe from attacks. By using adaptive multi-factor authentication, you can relax with the assurance that your customers are happy and safe when they’re using your online services and products.
With the potential to create everything from new revenue opportunities, to increased customer acquisition to cost savings, mobile is changing the landscape of banking as we know it. The rollout of foundational mobile services is already yielding tremendous success, and by increasing security while keeping a keen eye on user experience, leading banks and financial services providers can offer more advanced mobile services, which will play a key role in their growth strategies.
By broadening mobile banking offerings, financial institutions will be positioned to increase mobile transactions, shift transactions away from higher-cost channels, and retain and attract more customers.
To be successful with mobile, VASCO understands that banks need to pay close attention to the security of mobile applications and consumers, without creating challenges for the user experience.
What is Mobile identity_ - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
Bahaa Abdul Hadi is an Identity Management expert and regularly shares his experiences with his audience through his blogs.
Mobile phones have penetrated every aspect of our lives, whether banking or healthcare. Governments are encouraging digital transactions. In such a scenario, mobile identity becomes very important and helps in leveraging mobile use. Mobile Identity protects both the user as well as financial institutions from fraud. Mobile identity uses a user’s identity characteristics linked to a mobile device to identify, authenticate and verify the user.
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
In an era marked by rapid technological advancements, the landscape of banking has undergone a profound transformation. Traditional brick-and-mortar banks are increasingly being supplemented, if not replaced, by digital banking platforms. Amidst this transition, two key factors stand out as paramount: security and convenience. These platforms offer a unique blend of robust security measures and unparalleled convenience, making them indispensable tools for modern-day banking
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!Caroline Johnson
Customers are now enjoying more conveniences than ever through convenient digital banking services. With apps and software streamlined to their everyday needs, customers have become more demanding than ever before. And if banks fail to meet their demands, they will go elsewhere.
Security Measures in Digital Payment Apps: Keeping Your Money SafeSafeDeposit
With the increasing use of digital payment apps, it is crucial to prioritize security. These apps handle sensitive financial data, including credit card details, bank account information, and personal identification. Any breach in security can result in unauthorized access, identity theft, and financial losses.
Security Measures in Digital Payment Apps: Keeping Your Money Safe
ConfidentID_broc
1. CONFIDENTID MOBILE USER AUTHENTICATION
IDENTIFY YOUR CUSTOMERS
BEYOND A SHADOW OF A DOUBT
solutions for
SECURE MOBILE AND ONLINE BANKING
2. AUTHENTICATE WITH CONFIDENCE
Reduce losses due to
identity theft and fraud
Combine biometrics
and other methods for
highest levels of security
Customize security levels
based on transaction risk
Harness mobile devices
to increase security
across all channels
Meet and exceed
federal guidelines for
authentication
RECOGNIZE YOUR CUSTOMERS AND YOUR RISKS
The rapid rise of mobile and online banking is changing the face of the industry.
With users numbering in the hundreds of millions worldwide, mobile banking
presents unprecedented opportunities for increased convenience and accessibility.
At the same time, it introduces new threats from identity theft and fraud, as the
majority of transactions are conducted with no face-to-face customer contact.
Financial institutions worldwide are experiencing significant threats from hackers,
viruses, spyware and malware. A single attack can result in millions of dollars of
losses and damage your institution’s reputation and brand. Meanwhile, customers
are juggling a series of complex, ever-changing passwords to keep their identities
from being stolen.
Some banks have viewed losses from identity theft as a cost of doing business,
but as these attacks increase in frequency and amount, the need to address
cyberthreats has become apparent.
A powerful defensive weapon now available to banks is CSC’s ConfidentID™
Mobile User Authentication, a biometric-enabled authentication solution that
helps you verify your customers’ identity beyond a shadow of a doubt. Powered
by Daon’s IdentityX engine, this offering is part of the ConfidentID Mobile Security
Portfolio, CSC’s flexible, many-layered approach to security in the online banking
environment.
ConfidentID Mobile — CSC’s Full-Featured Portfolio for
Banking Security
Offerings
• User authentication
• Device management
• Mobile application protection
• Location intelligence
• Network services
• Data protection
Services
• Cybersecurity
• Mobile consulting
• Development and integration
• Testing and certification
3. BALANCE CONVENIENCE
WITH SECURITY
CSC introduced ConfidentID Mobile to help you significantly reduce identity
management risks and improve the bottom line while allowing your customers
to conduct their transactions with confidence — anytime, anywhere.
ConfidentID Mobile User Authentication provides efficient, reliable identity
authentication for mobile, online and other banking transactions using a
powerful combination of biometrics, passwords and other techniques. This
multifactor authentication provides higher levels of certainty than other
alternatives that rely on a single factor such as a password, PIN or Public Key
Infrastructure (PKI). The software employs dynamic security levels, allowing
you to customize the level of authentication based on a transaction’s value
and your organization’s risk management strategies.
ConfidentID Mobile harnesses the convenience, power and ubiquitous nature
of smartphones and tablets to put advanced security measures in the hands
of your customers. It uses the built-in capabilities of the devices they already
have and requires no additional hardware.
ConfidentID Mobile User Authentication benefits include:
• Provides robust security with the highest authentication fidelity available
• Unites banks and customers in protecting common interests
• Positions organization as security leader
• Scales easily and adapts to changing technologies
• Takes advantage of mobile device portability and convenience
• Does not require costly hardware or systems integration.
MOBILE BANKING
EXPANSION
Worldwide mobile
banking users will
reach 530 million by
2013 and 894 million
users worldwide by
2015. Mobile payment
transactions will
surpass $171 billion in
2012.
In 2011, worldwide
smartphone shipments
from the top five
vendors totaled 491.4
million. The average
person has access to
a mobile device for 14
hours per day.
Between 3 percent
and 15 percent of
international money
transfers handled
by agent networks
will be performed on
mobile handsets by
2015, generating up to
$6.2 billion in service
revenues.
Sources: Juniper Research,
Berg Insight, IDC, Gartner
4. IDENTIFY
PROBLEMS BEFORE
THEY BECOME YOURS
POSITIVELY IDENTIFY CUSTOMERS WITH MULTIFACTOR AUTHENTICATION
ConfidentID Mobile comprises two applications,
one securely located within your datacenter
and one on your customer’s mobile device.
When a customer visits your website, uses your
mobile app, or calls the help desk to perform a
transaction, a request is made from the bank’s
server to the customer’s mobile device for
verification.
The type of verification required depends on the
type and monetary amounts of the transaction
and your institution’s risk policies. It might
include some combination of biometrics and
passwords that can be used in conjunction with
basic possession of the device itself and even
the customer’s GPS location. The ConfidentID
Mobile server assesses the information and, if
authentication is successful, allows the requested
transaction to complete without further action
from the customer.
ConfidentID Mobile supports a range of
authentication techniques based on:
• Something your customer has, such as a
smartphone or tablet
• Something your customer knows, such as a
password or PIN
• Something your customer is, utilizing biometrics
that measure distinctive physiological
characteristics (such as face, voice or palm
recognition)
• Your customer’s location, which can be verified
by global positioning system (GPS), IP address
and cellular triangulation.
By tying all these methods together, you can
achieve truly robust authentication capabilities to
ensure the integrity of all customer transactions.
RISE OF IDENTITY THEFT AND FRAUD
Each year, millions of personal identities are stolen, many from stolen PCs or mobile devices. Malicious
cyberattacks are on the rise with consumers losing an estimated $3.4 billion in 2011 alone (CyberSource).
In fact, one employee of a large bank leaked confidential account information to scammers that
resulted in more than $10 million in losses.
Even mobile banking applications are under attack as
cybercriminals exploit security flaws, including storage
of sensitive user details in hidden files on smartphones.
Crimeware kits such as Zeus and Spyware have
used mobile apps as helpers to bypass two-factor
authentication and gain access to victims’ money.
5. GAIN CERTAINTY
AND FLEXIBILITY
ConfidentID Mobile offers multiple forms of
biometric analysis. The authentication process
is set by users and can vary based on the type
and monetary amounts of transactions.
ConfidentID Mobile far exceeds the authentication measures
recommended by the Federal Financial Institutions Examination
Council (FFIEC), which in 2011 warned that reliance on single-
factor authentication as the only control mechanism is “inadequate
for high-risk transactions involving access to customer information
or the movement of funds to other parties.”
The solution’s technology captures voice, face and palm
biometrics through a smartphone or tablet, encrypts them, and
forwards the encrypted data over the data channel. ConfidentID
Mobile also provides a positive confirmation of the transaction
details to your users, which means they can tell if the transaction
has been modified between the transaction request and the server.
CUSTOMIZE SECURITY LEVELS TO MATCH RISK
CSC’s ConfidentID Mobile lets you customize the level of security
for different types and values of transactions in order to manage
risk accurately and appropriately. You can give customers added
flexibility with the option to adjust their security levels as long as
they meet your minimum requirements.
This balance between customer convenience and rock-solid
security provides a key point of brand differentiation for your
organization in today’s security-conscious market. ConfidentID
Mobile appeals to tech-savvy early adopters as well as security-
focused businesses and customers.
The available levels of security cover all types of transaction
scenarios. For example, a customer transferring $500 from one
account to another would be required to complete a lower level
of authentication than a CFO performing a payroll transaction or
a commercial banker moving large funds for clients. The flexibility
accommodates high-dollar, high-risk transactions or low-risk, low-
value transactions, with the ability to adjust settings based upon
your security and risk policies.
6. SHINE A LIGHT
ON FRAUD
STOP HACKERS IN THEIR TRACKS
ConfidentID Mobile User Authentication defeats
growing threats to online security such as “man-
in-the-middle” (MitM) and “man-in-the-browser”
(MitB) attacks, in which an attacker intercepts
a communication between the bank server
application and the customer’s device. These
attacks are increasingly used to steal financial
information and change transaction values
without the customer even recognizing it.
ConfidentID Mobile stops such attacks in their
tracks. It provides both in- and out-of-band
transactional authentication options for different
security levels. At lower levels, a simple click of an
“OK” button may suffice. As the transactional level
increases, the user might be asked for additional
forms of authentication such as a PIN or password
and a face, voice or palm image, based upon the
risk polices you have set in place.
These additional options can also be randomized,
making it impossible for playback repetition
tools to be used against your customers. At
the same time, behind the scenes, mutual PKI
authentication between the device and the
ConfidentID Mobile Server is being performed.
Finally, location intelligence can provide one
additional corroboration.
This is one area in which mobile technology
facilitates security. Because so many consumers
already have a smartphone available, they can
easily access it to provide identity confirmation
for transactions — effectively defeating MitM and
MitB attacks.
TAKE ADVANTAGE OF EMERGING
TECHNOLOGIES
ConfidentID Mobile User Authentication is
hardware-agnostic and designed to run on
virtually any mobile device that provides basic
image and voice capture capabilities. Both your
customers and employees can take advantage
of its security capabilities using the devices
they already own. There’s no need to invest
in specialized biometric equipment. And the
software is based upon a service-oriented
architecture using Web services, so it can easily
accommodate and integrate new technologies as
they emerge.
CSC gives you multiple choices for implementing
the ConfidentID Mobile portfolio. You can install
and manage the software at your data center and
let your customers download the application from
an app store, or you may elect to let CSC’s expert
personnel manage the software at your location
or your third-party service center. Other options
are planned for the future to provide further
flexibility and cost effectiveness.
7. DISCOVER CSC’S BANKING, IDENTITY MANAGEMENT AND CYBERSECURITY EXPERTISE
With decades of experience in supporting banks and a wide range of other organizations, CSC is a leader in the
fields of financial transaction processing and cybersecurity risk management. We work closely with government
security agencies and large commercial organizations to deliver a practical, comprehensive approach to keep
pace with today’s dynamic risk landscape. Our suite of IT security solutions includes:
• Managed security services
• Identity management and privacy assurance solutions
• CSC StrikeForce vulnerability and penetration testing services
• Common criteria compliance and IT security testing.
CHOOSE FROM A FULL RANGE OF BANKING SOLUTIONS
ConfidentID Mobile is one part of the complete range of banking, lending and credit services solutions
provided by CSC:
• Expert consulting services based on decades of industry experience
• Industry-leading software applications
• Application services such as systems integration, upgrades, development and testing
• Infrastructure services including managed hosting, cloud computing, virtualization and security
• Business process services to support core processing.
SCAN TO
LEARN MORE
Find out how CSC can help you identify customers beyond a
shadow of a doubt. Visit www.csc.com/confidentIDmobile, call
1.800.345.7672 (+1.469.499.9981 if outside the U.S.A.) or send
an email to inforequests@csc.com.