SlideShare a Scribd company logo
1 of 14
EDDIE GLENN, SENIOR PRODUCT MARKETING MANAGER
eddie.glenn@iovation.com
FEBRUARY 2018
DEVICE REPUTATION
Has THAT Device Been Involved in Past Fraud?
WEBINAR
2
STOPPING FRAUD WITH DEVICE INTELLIGENCE
DEVICE
RECOGNITION
DEVICE
ATTRIBUTES
ONLINE
BEHAVIOR
 Uniquely recognize any device
connected to internet
 Over 4.5B devices in our database
 We recognize devices as they
move amongst online/mobile
businesses
 Anomalous device attributes
 Jailbroken/rooted
 Geolocation inconsistencies
 Device velocity
 Account velocity
 Evasive
REPUTATION PATTERNS
& RULES
3
REPUTATION
 Recognize the individual
 Report bad behavior
 Factual & detailed
 Associations with others
Charlie Bowdre
4
UNDERSTANDING
DEVICE REPUTATION
 Recognize the device
 Report bad behavior
 Factual & detailed
 Associations with others
5
 As a device visits your mobile/web
property over time, we need to
recognize it as the same device
Step 1:
DEVICE
RECOGNITION
… …
time
 If this device visits other web/mobile
properties, we need to be able to
recognize it as the same device
 We must minimize the chance of
mistaking a different device for that
device
• DEVICE RECOGNITION ACCURACY CRITICAL
• LOW FALSE POSITIVE RATE IMPORTANT
6
 Our network is comprised of fraud and
security analysts from the companies
using our services
Step 2:
REPORT
BAD
BEHAVIOR
 When one of them confirms that a
particular device or account is involved
in fraud or abuse, they tag it
 This establishes a reputation for that
device or account
• 4,000+ Fraud & Security Analysts in our network
• 48M Confirmed Fraud and Abuse Reports placed
iovation Cybercrime Fighting Network
 The reputation tag is on the device or
account, not on the individual/person
INDUSTRY COLLABORATION IS KEY TO SHUTTING DOWN FRAUD RINGS
7
Step 3:
DETAILED
REPUTATION
• 6 categories of reputation
• 45+ different fraud and abuse tags
• Who filed the report?
FINANCIAL
FRAUD
MISCONDUCT
CHEATING
IDENTITY
THEFT
POLICY
FRAUD
B2B
FINANCIAL
FINANCIAL FRAUD:
 Credit Card or ACH/Debit fraud
 Friendly chargeback
 Shipping Fraud
 Affiliate fraud
MISCONDUCT:
 Promotion abuse
 Abusive to support
 SPAM
 Profile misrepresentation
OTHER REPUTATION INFO:
• Who filed the reputation report? Your business or another iovation customer?
• Is the reputation report on that specific device or is it ‘associated’ to a tagged device?
Reputation specifies the type of fraud or abuse the device
or account is tagged with
8
Step 3:
DETAILED
REPUTATION
AT A GLANCE:
Breakdown of reputation reports filed in 2017 from
iovation customers in the Retail & Financial Industries
0%
5%
10%
15%
20%
25%
30%
35%
40%
RETAIL INDUSTRY CY 2017 (1.7M total)
0%
5%
10%
15%
20%
25%
30%
35%
FINANCIAL INDUSTRY CY 2017 (1.4M total)
9
Step 4:
ASSOCIATIONS
Credit card fraud
confirmed on this
user account & it
is tagged
CC
FRAUD
?
 What should you do?
 Stop the transaction?
 Review the transaction?
 Allow the transaction?
A new account
is being opened
PROMO
ABUSE
?
 What should you do?
 Stop the transaction?
 Review the transaction?
 Allow the transaction?
10
Step 4:
ASSOCIATIONS
CHARIT
Y
RETAIL
A
BANK A BANK B
Stolen ID: New CC Synthetic ID: New CC
Stolen CC
Over time, iovation is able to determine that
these devices are associated with each other
FRAUD RING EXAMPLE
ACROSS MULTIPLE INDUSTRIES
CHARGE
BACK
For a while, no one realizes that there is a
problem even though the fraudsters have
successfully applied for new credit cards
11
MAKING DECISIONS USING REPUTATION
M U L T I P L E F A C T O R S
THE TYPE OF
TRANSACTION
INVOLVED
(new account,
checkout, etc)
THE TYPE
REPUTATION
REPORT
(credit card fraud,
chargeback, promo)
WHO PLACED
THE REPORT?
(your company,
another iovation
subscriber)
DIRECT OR
ASSOCIATED?
(is reputation on that
specific device or an
associated device?)
12
H O W I O VAT I O N R E TAI L C U S TO M E R S U S E R E P U TAT I O N
C Y 2 0 1 7
DENY
TRANSACTIONS
59%
REVIEW
TRANSACTIONS
16%
ALLOW
TRANSACTIONS
11%
13
THE VALUE OF
DEVICE REPUTATION
PREVENT FRAUD BY:
 Looking beyond the user (stolen ID,
breached login credentials)
 Leveraging the experience of others
 Detailed intelligence that you can action
on in real-time
Friendly
Chargeback
Credit Card
Fraud
Promotions
Abuse
1st Party
Application
Fraud
Chip
Dumping
Q&A
THANK YOU!

More Related Content

What's hot

Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 
Key trends to drive your payments strategy
Key trends to drive your payments strategyKey trends to drive your payments strategy
Key trends to drive your payments strategyTu Tony
 
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...Smart Payment Association
 
PCI P2PE - World's first PCI-P2PE certified mPOS app
PCI P2PE - World's first PCI-P2PE certified mPOS appPCI P2PE - World's first PCI-P2PE certified mPOS app
PCI P2PE - World's first PCI-P2PE certified mPOS appHandpoint mobile POS
 
Mobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseMobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseDESMOND YUEN
 
Marco Konopacki talks about Mudamos at TICTeC 2018
Marco Konopacki talks about Mudamos at TICTeC 2018Marco Konopacki talks about Mudamos at TICTeC 2018
Marco Konopacki talks about Mudamos at TICTeC 2018mysociety
 
Thoughts on the Future of Payments
Thoughts on the Future of PaymentsThoughts on the Future of Payments
Thoughts on the Future of PaymentsAinsley Ward
 
Mobile Payments revolution
Mobile Payments revolutionMobile Payments revolution
Mobile Payments revolutionPragati Rai
 
Most promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG AnalyticsMost promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG AnalyticsSG Analytics
 
Colendi - NOAH19 Berlin
Colendi - NOAH19 BerlinColendi - NOAH19 Berlin
Colendi - NOAH19 BerlinNOAH Advisors
 
Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet securitySuraj Pratap
 
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...BlueHornet
 
Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Ppcolleneakard
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanGerhard Fasol
 
White Eagle Corporate Presentation December 2011
White Eagle Corporate Presentation December 2011White Eagle Corporate Presentation December 2011
White Eagle Corporate Presentation December 2011warrenhardy
 

What's hot (20)

Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Key trends to drive your payments strategy
Key trends to drive your payments strategyKey trends to drive your payments strategy
Key trends to drive your payments strategy
 
Peer to-peer mobile payments
Peer to-peer mobile paymentsPeer to-peer mobile payments
Peer to-peer mobile payments
 
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
 
PCI P2PE - World's first PCI-P2PE certified mPOS app
PCI P2PE - World's first PCI-P2PE certified mPOS appPCI P2PE - World's first PCI-P2PE certified mPOS app
PCI P2PE - World's first PCI-P2PE certified mPOS app
 
Mobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseMobile payment-security-risk-and-response
Mobile payment-security-risk-and-response
 
Presentation money 2.0
Presentation money 2.0Presentation money 2.0
Presentation money 2.0
 
Marco Konopacki talks about Mudamos at TICTeC 2018
Marco Konopacki talks about Mudamos at TICTeC 2018Marco Konopacki talks about Mudamos at TICTeC 2018
Marco Konopacki talks about Mudamos at TICTeC 2018
 
Thoughts on the Future of Payments
Thoughts on the Future of PaymentsThoughts on the Future of Payments
Thoughts on the Future of Payments
 
Mobile Payments revolution
Mobile Payments revolutionMobile Payments revolution
Mobile Payments revolution
 
Most promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG AnalyticsMost promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG Analytics
 
From Payment to Digital Wallet
From Payment to Digital WalletFrom Payment to Digital Wallet
From Payment to Digital Wallet
 
Colendi - NOAH19 Berlin
Colendi - NOAH19 BerlinColendi - NOAH19 Berlin
Colendi - NOAH19 Berlin
 
Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet security
 
SmartGo
SmartGo SmartGo
SmartGo
 
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
 
Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Pp
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
Kona Corporate Profile
Kona Corporate ProfileKona Corporate Profile
Kona Corporate Profile
 
White Eagle Corporate Presentation December 2011
White Eagle Corporate Presentation December 2011White Eagle Corporate Presentation December 2011
White Eagle Corporate Presentation December 2011
 

Similar to Has THAT device been involved in past fraud?

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesCallcredit123
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewSteven Lane
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudKyriba Corporation
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachGuardian Analytics
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesCallcredit123
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...TransUnion
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO Alliance
 
Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014360insights
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 

Similar to Has THAT device been involved in past fraud? (20)

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules Overview
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slides
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Has THAT device been involved in past fraud?

  • 1. EDDIE GLENN, SENIOR PRODUCT MARKETING MANAGER eddie.glenn@iovation.com FEBRUARY 2018 DEVICE REPUTATION Has THAT Device Been Involved in Past Fraud? WEBINAR
  • 2. 2 STOPPING FRAUD WITH DEVICE INTELLIGENCE DEVICE RECOGNITION DEVICE ATTRIBUTES ONLINE BEHAVIOR  Uniquely recognize any device connected to internet  Over 4.5B devices in our database  We recognize devices as they move amongst online/mobile businesses  Anomalous device attributes  Jailbroken/rooted  Geolocation inconsistencies  Device velocity  Account velocity  Evasive REPUTATION PATTERNS & RULES
  • 3. 3 REPUTATION  Recognize the individual  Report bad behavior  Factual & detailed  Associations with others Charlie Bowdre
  • 4. 4 UNDERSTANDING DEVICE REPUTATION  Recognize the device  Report bad behavior  Factual & detailed  Associations with others
  • 5. 5  As a device visits your mobile/web property over time, we need to recognize it as the same device Step 1: DEVICE RECOGNITION … … time  If this device visits other web/mobile properties, we need to be able to recognize it as the same device  We must minimize the chance of mistaking a different device for that device • DEVICE RECOGNITION ACCURACY CRITICAL • LOW FALSE POSITIVE RATE IMPORTANT
  • 6. 6  Our network is comprised of fraud and security analysts from the companies using our services Step 2: REPORT BAD BEHAVIOR  When one of them confirms that a particular device or account is involved in fraud or abuse, they tag it  This establishes a reputation for that device or account • 4,000+ Fraud & Security Analysts in our network • 48M Confirmed Fraud and Abuse Reports placed iovation Cybercrime Fighting Network  The reputation tag is on the device or account, not on the individual/person INDUSTRY COLLABORATION IS KEY TO SHUTTING DOWN FRAUD RINGS
  • 7. 7 Step 3: DETAILED REPUTATION • 6 categories of reputation • 45+ different fraud and abuse tags • Who filed the report? FINANCIAL FRAUD MISCONDUCT CHEATING IDENTITY THEFT POLICY FRAUD B2B FINANCIAL FINANCIAL FRAUD:  Credit Card or ACH/Debit fraud  Friendly chargeback  Shipping Fraud  Affiliate fraud MISCONDUCT:  Promotion abuse  Abusive to support  SPAM  Profile misrepresentation OTHER REPUTATION INFO: • Who filed the reputation report? Your business or another iovation customer? • Is the reputation report on that specific device or is it ‘associated’ to a tagged device? Reputation specifies the type of fraud or abuse the device or account is tagged with
  • 8. 8 Step 3: DETAILED REPUTATION AT A GLANCE: Breakdown of reputation reports filed in 2017 from iovation customers in the Retail & Financial Industries 0% 5% 10% 15% 20% 25% 30% 35% 40% RETAIL INDUSTRY CY 2017 (1.7M total) 0% 5% 10% 15% 20% 25% 30% 35% FINANCIAL INDUSTRY CY 2017 (1.4M total)
  • 9. 9 Step 4: ASSOCIATIONS Credit card fraud confirmed on this user account & it is tagged CC FRAUD ?  What should you do?  Stop the transaction?  Review the transaction?  Allow the transaction? A new account is being opened PROMO ABUSE ?  What should you do?  Stop the transaction?  Review the transaction?  Allow the transaction?
  • 10. 10 Step 4: ASSOCIATIONS CHARIT Y RETAIL A BANK A BANK B Stolen ID: New CC Synthetic ID: New CC Stolen CC Over time, iovation is able to determine that these devices are associated with each other FRAUD RING EXAMPLE ACROSS MULTIPLE INDUSTRIES CHARGE BACK For a while, no one realizes that there is a problem even though the fraudsters have successfully applied for new credit cards
  • 11. 11 MAKING DECISIONS USING REPUTATION M U L T I P L E F A C T O R S THE TYPE OF TRANSACTION INVOLVED (new account, checkout, etc) THE TYPE REPUTATION REPORT (credit card fraud, chargeback, promo) WHO PLACED THE REPORT? (your company, another iovation subscriber) DIRECT OR ASSOCIATED? (is reputation on that specific device or an associated device?)
  • 12. 12 H O W I O VAT I O N R E TAI L C U S TO M E R S U S E R E P U TAT I O N C Y 2 0 1 7 DENY TRANSACTIONS 59% REVIEW TRANSACTIONS 16% ALLOW TRANSACTIONS 11%
  • 13. 13 THE VALUE OF DEVICE REPUTATION PREVENT FRAUD BY:  Looking beyond the user (stolen ID, breached login credentials)  Leveraging the experience of others  Detailed intelligence that you can action on in real-time Friendly Chargeback Credit Card Fraud Promotions Abuse 1st Party Application Fraud Chip Dumping