SlideShare a Scribd company logo
1 of 36
Download to read offline
WEBINAR
CREATING A WINNING PLAYER EXPERIENCE WHILE
BATTLING ONLINE FRAUD
DECEMBER 2016
Eddie Glenn
Product Marketing Manager, Fraud Platform & Mobile
Tommy Lieberman
Product Manager, User Experience
2
EDDIE GLENN
P R O D U C T M A R K E T I N G M A N A G E R , F R A U D P R E V E N T I O N
TOM M Y L I EBER M AN
P R O D U C T M A N A G E R , U S E R E X P E R I E N C E
3
USER EXPERIENCE MATTERS.
IT SELLS.
IT BUILDS LOYALTY.
AGENDA
4
n BALANCING
FRAUD PREVENTION, SECURITY,
USER EXPERIENCE
n DEVICE INTELLIGENCE
n DYNAMIC AUTHENTICATION
n MACHINE LEARNING FOR
PREDICTING RISK AND TRUST
n CLOSING REMARKS
5
ONLINE SECURITYONLINE FRAUD
Credit card fraud
Affiliate fraud
Arbitrage
Bonus abuse
Stolen identity
Account take over
Breached credentials
Spoofing
Unauthorized access
Replay attack
YOUR CUSTOMER
6
WHAT’S YOUR
USER EXPERIENCE LIKE?
ACCOUNT CREATION
Probably already pretty
low-friction
But other than email, you
likely know very little about
them
Do you assume new players
are bots, potential
fraudsters, or your best new
customer?
7
WHAT’S YOUR
USER EXPERIENCE LIKE?
LOGIN
How complex are your
password requirements?
Do you offer a
password-less option?
What happens if a password
is forgotten?
How do you protect against
unauthorized logins?
How do you reward your
best customers?
8
WHAT’S YOUR
USER EXPERIENCE LIKE?
DEPOSITS, WITHDRAWALS,
PURCHASES
Do you require additional
verification or authentication?
If so, what kind?
Do you place limits/restrictions on
new players?
What’s your process for dealing
with high-risk players?
How do you reward your best
players?
9
COMPETING NEEDS
• Less user friction overall
• Better customer experiences
• More immediate access
• Build brand loyalty
• Ensure more time spent on
the site
PRODUCT & APP OWNERS
• Reduce attack surface
• Manage and minimize risk
• Stop fraud & cheating
• Leverage existing
capabilities, infrastructure
• Real-time threat indicators
SECURITY & FRAUD TEAMS
10
3 WAYS TO IMPROVE CUSTOMER EXPERIENCE
WHILE PROTECTING YOU & YOUR CUSTOMER
FRICTIONLESS
FRAUD
PREVENTION
CUSTOMER
AUTHENTICATION
PREDICTIVE
TRANSACTION
INSIGHT
DEVICE
INTELLIGENCE
12
Your
customer
63%
world’s population
with mobile 2015
75%(est)
world’s population
with mobile 2020
www.gsma.com/mobileeconomy/
13
DEVICE INTELLIGENCE
DEVICEINTELLIGENCE
DEVICE LOCATION
DEVICE BEHAVIOR
DEVICE RISKS
DEVICE HISTORY
DEVICE REPUTATION
OPERATOR’SBI
USER IDENTITY
USER BEHAVIOR
USER HISTORY
USER PAYMENT INFO
This separation is useful for:
n Privacy compliance
n Incidents of breached
credentials or stolen identity
n Fraud prevention
collaboration across
industries while obfuscating
user identity
n Secondary protection for
self-exclusion
A S E P A R A T E D L A Y E R O F C U S T O M E R I N T E L L I G E N C E
14
DEVICE INTELLIGENCE
Hundreds of attributes
collected
‘Fingerprint’ compared to
billions of previously
collected fingerprints
Frictionless to end user
‘Fingerprint’ collected in
real-time
Device risk indicators
Associations to other
devices, accounts, fraud
A DIGITAL FINGERPRINT OF THE DEVICES THAT CONNECT
TO YOUR WEB AND MOBILE APPS
15
ADDRESSING FRAUD PREVENTION, SECURITY & USER
EXPERIENCE
Is device authorized
for this account?
Where is device
located?
Does device have a
history of fraud?
Is this a trusted or risky
transaction?
How many accounts
has device accessed?
Is device hiding from
detection or exhibiting
other risks?
FRICTIONLESS. INVISIBLE TO USER. SAFE. RELIABLE.
16
WHAT DEVICE INTELLIGENCE IS NOT
Does not use personal
identifying information
Does not tie a device to a
named individual
Does not prevent winners
from winning more
Does not track a user’s
browsing history
Does not track gaming
behavior or wins/losses
Does not encourage
losers to spend more
17
Your view
ADVANCED DEVICE
INTELLIGENCE
n iovation knows related
devices and accounts
Fraud
Report
n If fraud is detected &
confirmed, evidence is placed
on the account
n Related devices and accounts
become associated with the
fraud stopping additional
fraud attempts
DEVICE ASSOCIATIONS DO NOT REQUIRE PII
18
iovation’s view
Your view
n iovation links devices between
subscribers and even different
industries
Fraud
Report
n If another iovation subscriber
confirms fraud on their
account…
PERSISTENT DEVICE IDENTIFICATION & ASSOCIATIONS STOP
FRAUDSTERS AS THEY MOVE BETWEEN BUSINESSES AND INDUSTRIES
ADVANCED DEVICE
INTELLIGENCE
19
iovation’s view
Your view
n Then you can use this to deny
transactions on accounts that
are accessed by the
fraudulent device Fraud
Report
THIS STOPS KNOWN FRAUDULENT DEVICES EVEN IF YOU
HAVE NEVER SEEN THEM BEFORE
ADVANCED DEVICE
INTELLIGENCE
STOPPING
FRAUDSTERS &
CHEATERS
WITHOUT ADDING FRICTION FOR
LEGITIMATE PLAYERS
21
D E V I C E I N T E L L I G E N C E C A N S T O P G A M B L I N G / G A M I N G F R A U D
D E V I C E R I S K S A N D D E V I C E B E H A V I O R R I S K S
Evasive behavior
Inaccurate geo-location
Emulator, virtual machine
Jailbroken, rooted
Used for multiple accounts
High # of transactions
Associated with past fraud
Past self-exclusion
Without added friction for your legitimate players
22
Exposing online gambling fraud.
Threats are higher in gambling than anywhere else online.
BONUS ABUSE
CHIP DUMPING COLLUSION
ALL-IN-ABUSE
ARBITRAGE BETTING SELF-EXCLUSION
23
Catch players involved in fraud schemes.
We reveal multiple devices accessing one or more accounts
and one device accessing multiple accounts.
Account 1
Account 2
Account 3
Account 4
PLAYER
AUTHENTICATION
ADVANCED ACCOUNT SECURITY WITH
MINIMAL USER FRICTION
25
Is this your
player’s login
experience?
Your users want a delightful
experience…
…but with the assurance their
account is secure
Device-based authentication provides advanced security you need
without the hassle for your players
26
DEVICE BASED AUTHENTICATION
F R I C T I O N L E S S , C O N T E X T U A L A N D A D A P T I V E D E V I C E - B A S E D A U T H E N T I C A T I O N
FRICTIONLESS CONTEXTUAL ADAPTIVE
Transparent
authentication
Patented device
recognition
Machine learning
adapts to normal
changes and
deviations
Assess the risk
and context of
every session
React in real-time
to anomalies
Understand
device reputation
and associations
Dynamic
authentication
decisioning
Respond to
different degrees
of risk
Drive step-up or
other actions
DEVICE ID
GEO / IP
INTEGRITY
CONTEXT
REPUTATION
Match
Low
Change
High
Change
27
MULTIFACTOR AUTHENTICATION
B E T T E R U S E R E X P E R I E N C E E V E N F O R H I G H R I S K T R A N S A C T I O N S
Drive all authentication
through one mobile experience,
with configurable options
Single-party or
multi-party real time swipe
authorization
Geo-fencing and time-
fencing constraints create
secure login zones
Proximity - Requires a preset
Bluetooth device to be nearby
Fingerprint - Biometric scans
using customer’s mobile device
Circle Code - Graphic pattern
uses customer’s mobile device
PIN Codes - Authenticate
using user-defined PIN codes
BUILDING
BRAND LOYALTY
WITH PREDICTIVE TRANSACTION INSIGHT
29
FRICTIONLESS USER EXPERIENCE
WITH TRANSPARENT FRAUD PREVENTION & AUTHENTICATION
REWARD GOOD CUSTOMERS
Build brand loyalty
Grow revenue
Grow market share
30
Building Brand Loyalty
Accelerate
VIP status
offers
Offer
bonus chips
Accelerate
deposit limit
increases
Less
cumbersome
deposit
procedures
while minimizing your risk
31
Machine learning with device intelligence
data can predict transaction outcomes:
• Highly risky (likely to be fraudulent)
• Highly trustworthy
23B
online
transactions
Millions of
combinations
analyzed
30M
confirmed
fraud reports
3B
known
devices
32
Predictive
Transaction
Insight
Device Behavior & Attributes
Device transaction velocity
Evasive, rooted/jailbroken,
other risk indicators
Associated with past fraud?
Account Behavior
Account transaction velocity
Associated with past fraud?
Demographic
City, ISP, geolocation
Patterns of geo-location
attributes
Mismatch of location
indicators
Subscriber
Subscriber and transaction
timezone patterns
CLOSING REMARKS
34
USING DEVICE INTELLIGENCE TO IMPROVE END TO END USER EXPERIENCE
Learn more about the user
without adding friction
Offer trustworthy users
incentives to create an
account and play
Keep out devices that are
risky or associated with
past fraud.
NEW ACCOUNT
CREATION
Eliminate need for
passwords while
protecting against account
take over
Offer trustworthy users
incentives to play more
LOGIN
Offer easier & convenient
payment options for
trustworthy customers
Identify high-risk customers
without adding friction to
good customers
Offer low-friction multi-
factor authentication to
protect the account
DEPOSITS,
WITHDRAWALS,
PURCHASES
35
ONLINE SECURITYONLINE FRAUD
Credit card fraud
Affiliate fraud
Arbitrage
Bonus abuse
Stolen identity
Account take over
Breached credentials
Spoofing
Unauthorized access
Replay attack
YOUR CUSTOMER
THANK YOU!

More Related Content

What's hot

Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtIGN MANTRA
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?TransUnion
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationTony Chew
 
Biometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and FallaciesBiometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and FallaciesTony Chew
 
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsCybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsTony Chew
 
Mobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CaseMobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CasemotionQR
 
Biometrics - Future of Authentication
Biometrics - Future of AuthenticationBiometrics - Future of Authentication
Biometrics - Future of AuthenticationTony Chew
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product BrochureBen Massey
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safeJorge Sebastiao
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysTransUnion
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?TransUnion
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...Cristian Garcia G.
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken MalwareSecurityMetrics
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsSecurityMetrics
 

What's hot (20)

Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirt
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
 
Biometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and FallaciesBiometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and Fallacies
 
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsCybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
 
Mobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CaseMobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use Case
 
Biometrics - Future of Authentication
Biometrics - Future of AuthenticationBiometrics - Future of Authentication
Biometrics - Future of Authentication
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safe
 
iFalcon Face Control Mobile
iFalcon Face Control MobileiFalcon Face Control Mobile
iFalcon Face Control Mobile
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good Guys
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
SmartGo
SmartGo SmartGo
SmartGo
 
Report on ios piracy
Report on ios piracyReport on ios piracy
Report on ios piracy
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken Malware
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit Cards
 

Viewers also liked

Protecting Digital Cash on the Move - Stories from the Field​
Protecting Digital Cash on the Move - Stories from the Field​Protecting Digital Cash on the Move - Stories from the Field​
Protecting Digital Cash on the Move - Stories from the Field​TransUnion
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldComrade
 
How Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments FraudHow Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments FraudVivastream
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...Experian
 
Online fraud in the Digital Gift Card Space
Online fraud in the Digital Gift Card SpaceOnline fraud in the Digital Gift Card Space
Online fraud in the Digital Gift Card SpaceChristopher Uriarte
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Viewers also liked (9)

Protecting Digital Cash on the Move - Stories from the Field​
Protecting Digital Cash on the Move - Stories from the Field​Protecting Digital Cash on the Move - Stories from the Field​
Protecting Digital Cash on the Move - Stories from the Field​
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile World
 
How Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments FraudHow Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments Fraud
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...
 
Online fraud in the Digital Gift Card Space
Online fraud in the Digital Gift Card SpaceOnline fraud in the Digital Gift Card Space
Online fraud in the Digital Gift Card Space
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Similar to Creating a Winning Experience While Battling Online Fraud

Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - ExperianAlex Robbins
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication SuiteMichael Thelander
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationTransUnion
 
UPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUniversalPassKey
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
Building Intelligent Data Products (Applied AI)
Building Intelligent Data Products (Applied AI)Building Intelligent Data Products (Applied AI)
Building Intelligent Data Products (Applied AI)Stephen Whitworth
 
Sentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationSentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationVentureBeat
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gamblingTrustIDnow
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Wultra
 
Combating Financial Fraud and Cyber-Crime on Mobile
Combating Financial Fraud and Cyber-Crime on MobileCombating Financial Fraud and Cyber-Crime on Mobile
Combating Financial Fraud and Cyber-Crime on MobileWultra
 
ThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureKen Lam
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 

Similar to Creating a Winning Experience While Battling Online Fraud (20)

Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
 
UPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUPK - Universal Pass Key General Overview
UPK - Universal Pass Key General Overview
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
Building Intelligent Data Products (Applied AI)
Building Intelligent Data Products (Applied AI)Building Intelligent Data Products (Applied AI)
Building Intelligent Data Products (Applied AI)
 
Sentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationSentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition Presentation
 
m:Cypher overview
m:Cypher overviewm:Cypher overview
m:Cypher overview
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gambling
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022
 
Combating Financial Fraud and Cyber-Crime on Mobile
Combating Financial Fraud and Cyber-Crime on MobileCombating Financial Fraud and Cyber-Crime on Mobile
Combating Financial Fraud and Cyber-Crime on Mobile
 
ThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureThreatMetrix for 3d-secure
ThreatMetrix for 3d-secure
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportTransUnion
 

More from TransUnion (16)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 

Recently uploaded

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 

Creating a Winning Experience While Battling Online Fraud

  • 1. WEBINAR CREATING A WINNING PLAYER EXPERIENCE WHILE BATTLING ONLINE FRAUD DECEMBER 2016 Eddie Glenn Product Marketing Manager, Fraud Platform & Mobile Tommy Lieberman Product Manager, User Experience
  • 2. 2 EDDIE GLENN P R O D U C T M A R K E T I N G M A N A G E R , F R A U D P R E V E N T I O N TOM M Y L I EBER M AN P R O D U C T M A N A G E R , U S E R E X P E R I E N C E
  • 3. 3 USER EXPERIENCE MATTERS. IT SELLS. IT BUILDS LOYALTY.
  • 4. AGENDA 4 n BALANCING FRAUD PREVENTION, SECURITY, USER EXPERIENCE n DEVICE INTELLIGENCE n DYNAMIC AUTHENTICATION n MACHINE LEARNING FOR PREDICTING RISK AND TRUST n CLOSING REMARKS
  • 5. 5 ONLINE SECURITYONLINE FRAUD Credit card fraud Affiliate fraud Arbitrage Bonus abuse Stolen identity Account take over Breached credentials Spoofing Unauthorized access Replay attack YOUR CUSTOMER
  • 6. 6 WHAT’S YOUR USER EXPERIENCE LIKE? ACCOUNT CREATION Probably already pretty low-friction But other than email, you likely know very little about them Do you assume new players are bots, potential fraudsters, or your best new customer?
  • 7. 7 WHAT’S YOUR USER EXPERIENCE LIKE? LOGIN How complex are your password requirements? Do you offer a password-less option? What happens if a password is forgotten? How do you protect against unauthorized logins? How do you reward your best customers?
  • 8. 8 WHAT’S YOUR USER EXPERIENCE LIKE? DEPOSITS, WITHDRAWALS, PURCHASES Do you require additional verification or authentication? If so, what kind? Do you place limits/restrictions on new players? What’s your process for dealing with high-risk players? How do you reward your best players?
  • 9. 9 COMPETING NEEDS • Less user friction overall • Better customer experiences • More immediate access • Build brand loyalty • Ensure more time spent on the site PRODUCT & APP OWNERS • Reduce attack surface • Manage and minimize risk • Stop fraud & cheating • Leverage existing capabilities, infrastructure • Real-time threat indicators SECURITY & FRAUD TEAMS
  • 10. 10 3 WAYS TO IMPROVE CUSTOMER EXPERIENCE WHILE PROTECTING YOU & YOUR CUSTOMER FRICTIONLESS FRAUD PREVENTION CUSTOMER AUTHENTICATION PREDICTIVE TRANSACTION INSIGHT
  • 12. 12 Your customer 63% world’s population with mobile 2015 75%(est) world’s population with mobile 2020 www.gsma.com/mobileeconomy/
  • 13. 13 DEVICE INTELLIGENCE DEVICEINTELLIGENCE DEVICE LOCATION DEVICE BEHAVIOR DEVICE RISKS DEVICE HISTORY DEVICE REPUTATION OPERATOR’SBI USER IDENTITY USER BEHAVIOR USER HISTORY USER PAYMENT INFO This separation is useful for: n Privacy compliance n Incidents of breached credentials or stolen identity n Fraud prevention collaboration across industries while obfuscating user identity n Secondary protection for self-exclusion A S E P A R A T E D L A Y E R O F C U S T O M E R I N T E L L I G E N C E
  • 14. 14 DEVICE INTELLIGENCE Hundreds of attributes collected ‘Fingerprint’ compared to billions of previously collected fingerprints Frictionless to end user ‘Fingerprint’ collected in real-time Device risk indicators Associations to other devices, accounts, fraud A DIGITAL FINGERPRINT OF THE DEVICES THAT CONNECT TO YOUR WEB AND MOBILE APPS
  • 15. 15 ADDRESSING FRAUD PREVENTION, SECURITY & USER EXPERIENCE Is device authorized for this account? Where is device located? Does device have a history of fraud? Is this a trusted or risky transaction? How many accounts has device accessed? Is device hiding from detection or exhibiting other risks? FRICTIONLESS. INVISIBLE TO USER. SAFE. RELIABLE.
  • 16. 16 WHAT DEVICE INTELLIGENCE IS NOT Does not use personal identifying information Does not tie a device to a named individual Does not prevent winners from winning more Does not track a user’s browsing history Does not track gaming behavior or wins/losses Does not encourage losers to spend more
  • 17. 17 Your view ADVANCED DEVICE INTELLIGENCE n iovation knows related devices and accounts Fraud Report n If fraud is detected & confirmed, evidence is placed on the account n Related devices and accounts become associated with the fraud stopping additional fraud attempts DEVICE ASSOCIATIONS DO NOT REQUIRE PII
  • 18. 18 iovation’s view Your view n iovation links devices between subscribers and even different industries Fraud Report n If another iovation subscriber confirms fraud on their account… PERSISTENT DEVICE IDENTIFICATION & ASSOCIATIONS STOP FRAUDSTERS AS THEY MOVE BETWEEN BUSINESSES AND INDUSTRIES ADVANCED DEVICE INTELLIGENCE
  • 19. 19 iovation’s view Your view n Then you can use this to deny transactions on accounts that are accessed by the fraudulent device Fraud Report THIS STOPS KNOWN FRAUDULENT DEVICES EVEN IF YOU HAVE NEVER SEEN THEM BEFORE ADVANCED DEVICE INTELLIGENCE
  • 20. STOPPING FRAUDSTERS & CHEATERS WITHOUT ADDING FRICTION FOR LEGITIMATE PLAYERS
  • 21. 21 D E V I C E I N T E L L I G E N C E C A N S T O P G A M B L I N G / G A M I N G F R A U D D E V I C E R I S K S A N D D E V I C E B E H A V I O R R I S K S Evasive behavior Inaccurate geo-location Emulator, virtual machine Jailbroken, rooted Used for multiple accounts High # of transactions Associated with past fraud Past self-exclusion Without added friction for your legitimate players
  • 22. 22 Exposing online gambling fraud. Threats are higher in gambling than anywhere else online. BONUS ABUSE CHIP DUMPING COLLUSION ALL-IN-ABUSE ARBITRAGE BETTING SELF-EXCLUSION
  • 23. 23 Catch players involved in fraud schemes. We reveal multiple devices accessing one or more accounts and one device accessing multiple accounts. Account 1 Account 2 Account 3 Account 4
  • 25. 25 Is this your player’s login experience? Your users want a delightful experience… …but with the assurance their account is secure Device-based authentication provides advanced security you need without the hassle for your players
  • 26. 26 DEVICE BASED AUTHENTICATION F R I C T I O N L E S S , C O N T E X T U A L A N D A D A P T I V E D E V I C E - B A S E D A U T H E N T I C A T I O N FRICTIONLESS CONTEXTUAL ADAPTIVE Transparent authentication Patented device recognition Machine learning adapts to normal changes and deviations Assess the risk and context of every session React in real-time to anomalies Understand device reputation and associations Dynamic authentication decisioning Respond to different degrees of risk Drive step-up or other actions DEVICE ID GEO / IP INTEGRITY CONTEXT REPUTATION Match Low Change High Change
  • 27. 27 MULTIFACTOR AUTHENTICATION B E T T E R U S E R E X P E R I E N C E E V E N F O R H I G H R I S K T R A N S A C T I O N S Drive all authentication through one mobile experience, with configurable options Single-party or multi-party real time swipe authorization Geo-fencing and time- fencing constraints create secure login zones Proximity - Requires a preset Bluetooth device to be nearby Fingerprint - Biometric scans using customer’s mobile device Circle Code - Graphic pattern uses customer’s mobile device PIN Codes - Authenticate using user-defined PIN codes
  • 29. 29 FRICTIONLESS USER EXPERIENCE WITH TRANSPARENT FRAUD PREVENTION & AUTHENTICATION REWARD GOOD CUSTOMERS Build brand loyalty Grow revenue Grow market share
  • 30. 30 Building Brand Loyalty Accelerate VIP status offers Offer bonus chips Accelerate deposit limit increases Less cumbersome deposit procedures while minimizing your risk
  • 31. 31 Machine learning with device intelligence data can predict transaction outcomes: • Highly risky (likely to be fraudulent) • Highly trustworthy 23B online transactions Millions of combinations analyzed 30M confirmed fraud reports 3B known devices
  • 32. 32 Predictive Transaction Insight Device Behavior & Attributes Device transaction velocity Evasive, rooted/jailbroken, other risk indicators Associated with past fraud? Account Behavior Account transaction velocity Associated with past fraud? Demographic City, ISP, geolocation Patterns of geo-location attributes Mismatch of location indicators Subscriber Subscriber and transaction timezone patterns
  • 34. 34 USING DEVICE INTELLIGENCE TO IMPROVE END TO END USER EXPERIENCE Learn more about the user without adding friction Offer trustworthy users incentives to create an account and play Keep out devices that are risky or associated with past fraud. NEW ACCOUNT CREATION Eliminate need for passwords while protecting against account take over Offer trustworthy users incentives to play more LOGIN Offer easier & convenient payment options for trustworthy customers Identify high-risk customers without adding friction to good customers Offer low-friction multi- factor authentication to protect the account DEPOSITS, WITHDRAWALS, PURCHASES
  • 35. 35 ONLINE SECURITYONLINE FRAUD Credit card fraud Affiliate fraud Arbitrage Bonus abuse Stolen identity Account take over Breached credentials Spoofing Unauthorized access Replay attack YOUR CUSTOMER