SlideShare a Scribd company logo
1 of 4
Download to read offline
Detect and Stop Fraud In Your Call
Centers
Pindrop Security’s Fraud Detection System (FDS) identifies call
spoofing and other attempts to defraud financial institutions
by providing a highly accurate call risk score. It verifies
location and call type and matches it against Caller ID or ANI
data to identify spoofing. It also creates a unique fingerprint
for the caller and compares the fingerprint to our database
of known fraud rings and repeat fraudsters regardless of the
real or spoofed number they are using.
What Does FDS Provide?
•	 Call analysis technology that can determine the actual
location and device type used by a caller and compare it
to Caller ID or ANI information to determine spoofing and
fraud.
•	 Unique acoustic fingerprint that allows you to match the
caller to other fraud attempts and examine their fraud
history.
•	 Non-intrusive validation of customers through
transparent location and device type verification.
How Do Financial Institutions Use FDS?
With Caller-ID and ANI completely compromised, there has
been no technological solution to detect deception in phone
calls. The problem has been solely addressed by knowledge-
based authentication practices, making the call center the
last line of defense against fraud.
FDS is used by call centers, fraud investigation and incident
response teams to evaluate callers as part of their anti-fraud
and transaction approval processes. FDS allows financial
institutions to more easily authenticate their customers and
other callers while improving their detection and prevention
of fraud.
FRAUD DETECTION SYSTEM
High-confidence risk
scoring for
every caller based on
location and call type
Detect 80% + of
inbound fraud calls
on the first call well
before approving
and carrying out
transactions
Track fraudsters and
correlate across many
spoofed numbers and
targeted institutions
Identify Fradulant
Callers
Prevent Fraud
Transactions
Actionable,
Accurate Fraud
Intelligence
DATA SHEET
* Pindrop Security’s CallDNATM
report provides critical
actionable information about
the call or number
PINDROPSECURITY.COM | 404.721.3767
“FDS allows financial institutions to more easily
authenticate their customers and other callers
while improving their detection and prevention of
fraud.”
Acoustic Fingerprint™ Call Analysis
How Do Financial Institutions Use FDS?
With Caller-ID and ANI completely compromised, there has been no technological solution
to detect deception in phone calls. The problem has been solely addressed by knowledge-
based authentication practices, making the call center the last line of defense against fraud.
FDS is used by call centers, fraud investigation and incident response teams to evaluate
callers as part of their anti-fraud and transaction approval processes. FDS allows financial
institutions to more easily authenticate their customers and other callers while improving
their detection and prevention of fraud.
Pindropsecurity.com | 404.721.3767
DATA SHEET
Pindrop Security’s acoustic fingerprint technology examines over 140 different audio “features” of
each call. It can identify the caller location and device type as well as provide a unique fingerprint to
identify and track fraudsters and to authenticate legitimate users and customers.
Identify Fraudsters and Authenticate Customers
Pindrop’s Fraud Detection System is based on audio analysis technology. Every call is
broken down and analyzed for over 140 (and growing) characteristics to form a unique
“fingerprint” for the call. With over 90% accuracy, FDS is able to determine the location of
the caller and the type of device being used to originate the call (VoIP, Cell, Land) – even
the provider for VoIP calls (Skype, etc.).
While this information alone is enough to determine fraud, we go further by then matching
the fingerprint to our database of fraud rings and repeat fraudsters. Typically, a fraudster
will have a large number of phone numbers and will have targeted many institutions.
This information is made available through the FDS as well, to assist fraud and incident
response teams.
How Do I Deploy the Fraud Detection System?
FDS is deployed in your environment as a 1U appliance. It connects to your call recording
store. FDS needs approximately 15 seconds of audio to analyze and match a call.
Product Features
•	 Web-based interface
•	 Alerting via email and SNMP
•	 Administrator and User management
DATA SHEET
PINDROPSECURITY.COM | 404.721.3767
Product Components
Inbound Call Monitoring
The Fraud Detection System can be used to monitor inbound
calls in a variety of ways. The easiest and most common
method is monitoring recorded calls. This allows FDS to
provide fraud scores to fraud teams with minutes of call
completion, well before a critical transaction can occur,
all while seamlessly and easily integrating with financial
institutions current environments.
Inbound Call Monitoring
FDS provides and easy-to-use interface which allows
extensive analysis of overall phone fraud in your environment
including:
•	 Volume and intensity of attacks and attackers
•	 Key indicators of attacks
•	 User, administrator, and organization specific
configurations and access
•	 Review support tickets and feature requests
For more
information on
Pindrop Solutions,
please contact us
at:
404-721-DROP (3767)
info@pindropsecurity.
com
DATA SHEET
PINDROPSECURITY.COM | 404.721.3767

More Related Content

What's hot

Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
 
Comprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraudComprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraudMassango Junior
 
Data sheet Securepay
Data sheet  SecurepayData sheet  Securepay
Data sheet Securepaygensoftpro
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Gsm location management by Engr.Hedayat ullah shujaee
Gsm location management by  Engr.Hedayat ullah shujaeeGsm location management by  Engr.Hedayat ullah shujaee
Gsm location management by Engr.Hedayat ullah shujaeeHedayatullah shujaee
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 

What's hot (20)

Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Comprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraudComprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraud
 
Data sheet Securepay
Data sheet  SecurepayData sheet  Securepay
Data sheet Securepay
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Gsm location management by Engr.Hedayat ullah shujaee
Gsm location management by  Engr.Hedayat ullah shujaeeGsm location management by  Engr.Hedayat ullah shujaee
Gsm location management by Engr.Hedayat ullah shujaee
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Pabx fraud
Pabx fraudPabx fraud
Pabx fraud
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 

Similar to Datasheet_Fraud_Detection_System

Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur guptaAankur Gupta
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
What is a Call Center?
What is a Call Center?What is a Call Center?
What is a Call Center?Jijo Mathew
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_FinancialAnthony Whittle
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Uniphore
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesSuruli Kannan
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays
 
TFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTradingTFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTradingAnthony Whittle
 
LEXForensica (003)
LEXForensica (003)LEXForensica (003)
LEXForensica (003)Johan Nel
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshureTrustIDnow
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
A to Z Must Know Call Center Terms
A to Z Must Know Call Center TermsA to Z Must Know Call Center Terms
A to Z Must Know Call Center TermsAnjani Vigha
 
IVR Number : Transform Business Communication with MCUBE
IVR Number : Transform Business Communication with MCUBEIVR Number : Transform Business Communication with MCUBE
IVR Number : Transform Business Communication with MCUBEMCUBE-VMC Technologies PVT LTD
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Decypher Connection Presentaion
Decypher Connection PresentaionDecypher Connection Presentaion
Decypher Connection Presentaion2020connection
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud PreventionA Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud PreventionInMobi
 

Similar to Datasheet_Fraud_Detection_System (20)

Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
What is a Call Center?
What is a Call Center?What is a Call Center?
What is a Call Center?
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprises
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
 
TFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTradingTFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTrading
 
The guide to combatting cross channel fraud
The guide to combatting cross channel fraudThe guide to combatting cross channel fraud
The guide to combatting cross channel fraud
 
LEXForensica (003)
LEXForensica (003)LEXForensica (003)
LEXForensica (003)
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
A to Z Must Know Call Center Terms
A to Z Must Know Call Center TermsA to Z Must Know Call Center Terms
A to Z Must Know Call Center Terms
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
IVR Number : Transform Business Communication with MCUBE
IVR Number : Transform Business Communication with MCUBEIVR Number : Transform Business Communication with MCUBE
IVR Number : Transform Business Communication with MCUBE
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Decypher Connection Presentaion
Decypher Connection PresentaionDecypher Connection Presentaion
Decypher Connection Presentaion
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud PreventionA Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
 

Datasheet_Fraud_Detection_System

  • 1. Detect and Stop Fraud In Your Call Centers Pindrop Security’s Fraud Detection System (FDS) identifies call spoofing and other attempts to defraud financial institutions by providing a highly accurate call risk score. It verifies location and call type and matches it against Caller ID or ANI data to identify spoofing. It also creates a unique fingerprint for the caller and compares the fingerprint to our database of known fraud rings and repeat fraudsters regardless of the real or spoofed number they are using. What Does FDS Provide? • Call analysis technology that can determine the actual location and device type used by a caller and compare it to Caller ID or ANI information to determine spoofing and fraud. • Unique acoustic fingerprint that allows you to match the caller to other fraud attempts and examine their fraud history. • Non-intrusive validation of customers through transparent location and device type verification. How Do Financial Institutions Use FDS? With Caller-ID and ANI completely compromised, there has been no technological solution to detect deception in phone calls. The problem has been solely addressed by knowledge- based authentication practices, making the call center the last line of defense against fraud. FDS is used by call centers, fraud investigation and incident response teams to evaluate callers as part of their anti-fraud and transaction approval processes. FDS allows financial institutions to more easily authenticate their customers and other callers while improving their detection and prevention of fraud. FRAUD DETECTION SYSTEM High-confidence risk scoring for every caller based on location and call type Detect 80% + of inbound fraud calls on the first call well before approving and carrying out transactions Track fraudsters and correlate across many spoofed numbers and targeted institutions Identify Fradulant Callers Prevent Fraud Transactions Actionable, Accurate Fraud Intelligence DATA SHEET * Pindrop Security’s CallDNATM report provides critical actionable information about the call or number PINDROPSECURITY.COM | 404.721.3767
  • 2. “FDS allows financial institutions to more easily authenticate their customers and other callers while improving their detection and prevention of fraud.” Acoustic Fingerprint™ Call Analysis How Do Financial Institutions Use FDS? With Caller-ID and ANI completely compromised, there has been no technological solution to detect deception in phone calls. The problem has been solely addressed by knowledge- based authentication practices, making the call center the last line of defense against fraud. FDS is used by call centers, fraud investigation and incident response teams to evaluate callers as part of their anti-fraud and transaction approval processes. FDS allows financial institutions to more easily authenticate their customers and other callers while improving their detection and prevention of fraud. Pindropsecurity.com | 404.721.3767 DATA SHEET Pindrop Security’s acoustic fingerprint technology examines over 140 different audio “features” of each call. It can identify the caller location and device type as well as provide a unique fingerprint to identify and track fraudsters and to authenticate legitimate users and customers.
  • 3. Identify Fraudsters and Authenticate Customers Pindrop’s Fraud Detection System is based on audio analysis technology. Every call is broken down and analyzed for over 140 (and growing) characteristics to form a unique “fingerprint” for the call. With over 90% accuracy, FDS is able to determine the location of the caller and the type of device being used to originate the call (VoIP, Cell, Land) – even the provider for VoIP calls (Skype, etc.). While this information alone is enough to determine fraud, we go further by then matching the fingerprint to our database of fraud rings and repeat fraudsters. Typically, a fraudster will have a large number of phone numbers and will have targeted many institutions. This information is made available through the FDS as well, to assist fraud and incident response teams. How Do I Deploy the Fraud Detection System? FDS is deployed in your environment as a 1U appliance. It connects to your call recording store. FDS needs approximately 15 seconds of audio to analyze and match a call. Product Features • Web-based interface • Alerting via email and SNMP • Administrator and User management DATA SHEET PINDROPSECURITY.COM | 404.721.3767
  • 4. Product Components Inbound Call Monitoring The Fraud Detection System can be used to monitor inbound calls in a variety of ways. The easiest and most common method is monitoring recorded calls. This allows FDS to provide fraud scores to fraud teams with minutes of call completion, well before a critical transaction can occur, all while seamlessly and easily integrating with financial institutions current environments. Inbound Call Monitoring FDS provides and easy-to-use interface which allows extensive analysis of overall phone fraud in your environment including: • Volume and intensity of attacks and attackers • Key indicators of attacks • User, administrator, and organization specific configurations and access • Review support tickets and feature requests For more information on Pindrop Solutions, please contact us at: 404-721-DROP (3767) info@pindropsecurity. com DATA SHEET PINDROPSECURITY.COM | 404.721.3767