SlideShare a Scribd company logo
Shirley Inscoe – Senior Analyst Aite Group
Eric Tran-Le - Vice President Product Management
How to Prevent Peer-to-Peer
Payment Fraud in Real-time
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 2©2018 Aite Group LLC.Page 2
Shirley Inscoe
Senior Analyst
sinscoe@aitegroup.com
+1.617.398.5050
www.aitegroup.com
Aite (pronounced “eye-tay”) Group is an
independent research and advisory firm focused on
business, technology, and regulatory issues and
their impact on the financial services industry.
Visit us on the web and connect with us on Twitter
and LinkedIn.
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 3©2018 Aite Group LLC.Page 3
Agenda
• Growing importance of mobile channel
• Payment evolution
• Impact on fraud prevention
• How to combat real-time payment fraud
• Key takeaways
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 4©2018 Aite Group LLC.Page 4
Faster payments have arrived; they are not a future event
• Payments are evolving to keep up
with market demand
• Payments are becoming faster and
can be initiated via mobile – the
device of choice
• Fraud always attacks new payment
methods; that is to be expected
and planned for
• Most FIs are not ready for real-
time payments, so must prepare
Mobile-first is consumers’ choice
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 5©2018 Aite Group LLC.Page 5
Digital P2P Payments Market Snapshot
$100.3
$147.1
$178.2
$215.8
$261.4
$316.6
2015 2016 e2017 e2018 e2019 e2020
Digital P2P Payment Market Snapshot, 2015 to e2020
(In US$ billions)
Source: Aite Group
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 6©2018 Aite Group LLC.Page 6
Payments are evolving, accelerating…
• New payment types are surfacing quickly in the market
- Designed to meet the needs of both consumers and businesses
• Everyone wants in on the action
- Apple Pay, Samsung Pay, Walmart Pay, Venmo
• Payments are mobile, allowing payments to occur anywhere
- Square Pay, Anywhere Commerce, Clover, PayPal Here, CardPointe
• Cryptocurrencies are becoming more mainstream
- Bitcoin, Litecoin, Ripple, Dash, Zcash, Monero
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 7©2018 Aite Group LLC.Page 7
It is all about faster payments…
• Payment speeds are accelerating
- Same day ACH
- Zelle – real time P2P
o Over 100 FIs have implemented or committed to implement
o FI doesn’t offer it? – simply download the Zelle app
o Partnerships with core processors extends capability to smaller financial institutions
• FIS, Fiserv, Jack Henry
- The Clearing House’s Real Time Payments (RTP)
o Payments originated by businesses
o Incubator service with FIS
o SWIFT gateway makes payment railway accessible
- Payment hubs increasingly used for least-cost routing
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 8©2018 Aite Group LLC.Page 8
Payments competition is
increasing rapidly
RTP
• Competitors are entering the market to
take advantage of payments demand
• Some players are owned by FIs, but
many are not
• Consumers and businesses want payments
they can trust and that are secure
• FI-controlled payments may be more
secure due to prior fraud experience
• Innovation is needed, and consumers
value ease of use; customer experience is
very important during the adoption phase
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 9©2018 Aite Group LLC.Page 9
Methodology
Source: Aite Group interviews with 19 large North American FIs, July to September 2017
$25 to $99
37%
$100 to $499
42%
$500+
21%
Respondents by Asset Size
(N=19; in US$ billions)
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 10©2018 Aite Group LLC.Page 10
Digital channel losses are on the rise
Source: Aite Group interviews with 19 large North American FIs, July to September
2017
Up
74%
Flat
21%
Down
5%
Q. Are your online/mobile fraud losses trending up, down, or are they
flat over the past 2 years? (N=19)
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 11©2018 Aite Group LLC.Page 11
Fraudsters never give up…
No matter what measures are taken, fraudsters will find a new method…
Fraud prevention
measures cannot be
stagnant, but must
change to meet
current market
demands.
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 12©2018 Aite Group LLC.Page 12
The bad guys use a variety of tactics
Source: Aite Group interviews with 19 large North American FIs, July to September 2017
89%
42%
32% 32%
21%
16%
5% 5%
ATO Application
fraud/
ID theft/
synthetics
mRDC First-party
fraud/scams
CNP fraud Money
movement
ACH ATM
cashout
Q. What are the top 3 types of losses being incurred in digital channels?
(N=19)
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 13©2018 Aite Group LLC.Page 13
Authentication is the
foundation for fraud prevention
• You must be able to determine:
• Is this applicant a real person or a bot?
• Is this a real person or a synthetic identity?
• Is this person who they claim to be?
• Is this person a known fraudster?
• Is this person registering for Zelle my good customer or an impersonator?
• Is the person initiating a Zelle transfer to a new payee my true customer or
an account takeover fraudster?
Doing this to
some degree
26%
Do a form of this;
needs improvement
32%
Not doing this,
but plan to
10%
Not doing this
at all
32%
Q. How is your FI working to orchestrate authentication, if at all?
(N=19)
Source: Aite Group interviews with 19 large North American FIs, July to September 2017
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 14©2018 Aite Group LLC.Page 14
FI fraud prevention moves to mobile-first
The mobile device can serve as the foundation for authentication in…
All channels, including:
• Online
• Contact centers
• POS
Aspects of authentication:
• Device fingerprinting
• Biometrics on device
• Geolocation
• One-time passwords
• Mobile network operator data
• Behavioral biometrics
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 15©2018 Aite Group LLC.Page 15
Transparent methods improve the customer experience
• Device fingerprinting
• Behavioral analytics
• Behavioral biometrics
Customer experience is more important than ever before and can
determine whether new fraud solutions are approved or not.
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 16©2018 Aite Group LLC.Page 16
The quest: Optimizing the balance between risk and friction
Seamless
experience
Device
identity
KBA
Fingerprint
biometric
SMS
OTP
Identity data
verification
Token
2-D facial
recognition
3-D facial
recognition
Mobile
app
push
Device
malware
Identity
document
verification
Eye vein
biometric
High
Medium
Low
Behavior
patterns
Behavioral
biometrics
Level of security
Username
password
High
friction
Iris
biometric
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 17©2018 Aite Group LLC.Page 17
Internal data, reconnaissance detection
Transparent solutions ( e.g. device identity,
behavioral analytics, behavioral biometrics)
Stepped-up authentication (e.g.
biometrics, one-time passwords)
Login security (e.g. biometrics, dynamic credentials)
A layered approach to security is essential. The challenge:
Making it holistic
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 18©2018 Aite Group LLC.Page 18
It’s a brave new world of financial crimes
• Old fashioned fraud & money laundering techniques are inadequate
- Rules based models can still be useful, but are not enough
- Real-time detection is necessary to avoid large losses or huge regulatory fines
- Interdiction capability is required to stop transactions in real time
• Machine learning models continuously improve based on feedback
- Can help reduce false positives significantly
- Supervised models are best accepted by regulators (early days)
• Tailor fraud and AML detection to meet payment windows
- Suspend, decision, release or delete
- Prioritize alerts based on risk level
- Consider auto-decisioning once confidence in model is established
- Ensure no discriminatory effects from models
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 19©2018 Aite Group LLC.Page 19
Key takeaways
• The threat environment continues to escalate; EMV, faster payments,
ongoing data breaches, and increased mobile functionality will only up the
ante
• The mobile device, properly enabled, can add much value in combatting
fraud
• Financial institutions must have sound strategies to implement real time
payments or fraud will mushroom
• Ensure your fraud processes are easily adaptable, fraud can change quickly,
and you must be able to make adjustments
• Review your authentication strategies and update customer contact
information as part of your faster payments implementation process
• Don’t employ too much friction; transparent solutions can enable strong
security as well as a great customer experience
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 20
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended
for information purposes only, and may not be incorporate into any contract. It is
not a commitment to deliver any material, code, or functionality and should not
be relied upon in making purchasing decision. The development, release, and
timing of any features or functionality described for Guardian Analytics’ products
remains at the sole discretion of Guardian Analytics
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 21
What Does Guardian Analytics Do
• Alert Fraud Operation Team
• Stop Fraudulent Account
Activities
• Detect Fraud Risk Through
Behavioral Analytics
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 22
• Self-Learn Individual User’s Behavior
• Detect Anomalous User Activities
• Adapt to New Threats
• Do Not Depend on Rules
• Monitor Hundreds Events & Attributes in Real-Time
Detect Fraud with Behavioral Analytics
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 23
Financial
institutions
Commercial & retail
account holders
Banking
activities
450 40M 5B
Guardian Analytics at a Glance
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 24
Optimal The Balance Between Risk and Friction for Payments
Seamless
experience
Device
identity
KBA
Fingerprint
biometric
SMS
OTP
Identity data
verification
Token
2-D facial
recognition
3-D facial
recognition
Mobile
app
push
Device
malware
Identity
document
verification
Eye vein
biometric
High
Medium
Low
Behavior
patterns
Behavioral
biometrics
Level of security
Username
password
High
friction
Iris
biometric
Behavioral Biometrics is about identifying people
by how they do what they do rather than by what
they are (e.g. fingerprint, face) or what they know
(secret question, password) or what they have
(token, SMS one-time code)
Behavioral
Biometrics
Behavioral
Patterns
Behavioral Patterns is designed to understand the
normal behavior of each individual account
holder, calculate the risk of each new activity and
enable real-time intervention commensurate to
the risk
A Device Fingerprint is a set of information
collected about a device or user profile. The goal
is to create a digital identity which can be used as
the fingerprint of a mobile or desktop device
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 25
Enabling Friction Right & Real-time Intervention
FRICTION RIGHT PREVENTION
REAL-TIME INTERVENTION
FRICTION LESS FRAUD DETECTION
$
RISK ENGINE
• Friction Less Fraud Detection
• Friction Right Prevention
• Real-time Intervention
• Self-Learn Individual User’s Behavior
• Adapt to New Threats
• Do Not Depend on Rules
• Monitor Hundreds Events &
Attributes in Real-Time
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 26
Faster Payments and Friction Less
• Temporary
employee
wages
• Emergency
payroll
• Urgent B2C
(Disaster relief)
Utilities, DMV,…
charitable organizations
receive funds into their
account
Person-to-Business(P2B)• Immediate
bill payments
• E-commerce
purchases
• Just-in-time
payment to
suppliers
• Immediate
bill payments
Business-to-Business(B2B) Suppliers receive funds
transfers to their
accounts directly
$
Customer RECEIVES
$ IN MINUTES using
P2P Service
$
Person-to-Person(P2P)
• Non-commerce
payments
• Account-to-
Account
transfers
• Payment for
information
services
Business-to-Person(B2P) Workers receive funds
transfers to their
accounts directly
Friction Less
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 27
Example: P2P ACH Funds Transfer in a Nutshell
Bank A
P2P Service
Participant
Bank B
P2P Service
Participant
1- Bank A
• Debit Customer 1 acct. of $150
• Message P2P Service Provider
• Funds moved to settlement account
2- Bank B
• Credit Customer 2 acct. of $150
• Message P2P Service Provider
3- Bank A Settles with Bank B
• Bank A ACH to Bank B
in HOURS
Customer 1
Account Linked
$
Customer 1
SENDs Customer 2
$150
$
Customer 2
RECEIVES
$150
in MINUTES
Customer 2
Account Linked
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 28
Method of Compromises
Malware
Online Account
Take Over
Phishing
Email Compromise
Device
Account Take Over
Bank A
P2P Service
Participant
Bank B
P2P Service
Participant
Customer 2
Account Linked
Customer 1
Account Linked
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 29
Guardian Analytics Friction Less User Experience
FRICTION LESS
Device
Account Take Over
Online Account
Take Over
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 30
Guardian Analytics Friction Right & Real-time
Intervention
FRICTION LESS
FRICTION RIGHT
REAL-TIME
INTERVENTION
Device
Account Take Over
Online Account
Take Over
Malware
Phishing
Email Compromise
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 31
Current Guardian Analytics Use Cases
FRICTION LESS
FRICTION RIGHT
REAL-TIME
INTERVENTION
P2B & P2P Platforms
• Fiserv Checkfree (bill pay)
• Fiserv Popmoney (P2P transfer)
• Fiserv TransferNow (A2A transfer)
Mobile Platform
• Access Softkey, Fiserv – CFG SSB,
ACI – Mobile Banking
• ConnectFSS, Digital Insight - Digital
Banking
• Fiserv – Mobiliti, Jack Henry –
NetTeller
• Malauzai, Tyfone, Wescom Resources
Group
• ACI, Bottomline, Jack Henry
Online Platform
• Fiserv – Architect/CFG IBS/CDG SSB
• ACI – LFIN/Universal Online Banker
• ConnectFSS
• Digital Insight – Digital Banking (Retail)
• Fiserv- Corillian Online Hosted/Licensed
• Fiserv - Retail
Online/SecureNow(COASP)
Wire Platform
• Fiserv WireXchange
• Fiserv Wire Manager
• Fundtech PAYplus Connect (GFX)
• Fundtech PAYPlus USA
• Pathfinder WITS
• Ocean Systems – Fedlink
• Customers who can consume Wire API
ACH Platform
• ACI Enterprise Banker
• Bottomline Business Banking
• Fedline Advantage
• First Data - FundsXpress
• FIS ACH/BeB/CLK
• Fiserv ACH Manager/DNAWeb/PEP+
• Fiserv Premier ACH
• Finastra Fundtech ACH Plus
• Jack Henry Goldleaf/Silverlake
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 32
Actual Use Case
1. User Agent
2. Language
3. Color Depth
4. Screen Resolution
5. Timezone
6. Has session storage or not
7. Has local storage or not
8. Has indexed DB
9. Has IE specific ‘AddBehavior’
10. Has open DB
11. CPU Class
12. Platform
13. DoNotTrack or not
14. Full list of installed fonts & order
15. A list of installed fonts
16. Canvas fingerprinting
17. WebGL fingerprinting
18. Plugins (IE included)
19. Is AdBlock installed or not
20. Has the user tampered with its
languages
21. Has the user tampered with its
screen resolution
22. Has the user tampered with its
OS
23. Has the user tampered with is
browser
24. Touch screen detection &
capabilities
25. Pixel Ratio
26. System’s total number of logical
processors available to user
agent
27. Device memory
Device fingerprinting gets around
cookie-based privacy settings (e.g.,
Google's incognito mode)by instead
relying on information that all browsers
make readily available to client-side
scripting languages like JavaScript.
Information like operating system,
TCI/IP configuration, and browser
configuration. Guardian Analytics
combines this information to create a
semi-unique identification of online &
mobile users
Example of Device Fingerprinting
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 33
Example of Authentication and Logins Risk Models
Actual Use Case
20
15
10
5
0
HourofDay
Day of Week
20
15
10
5
0
HourofDay
Day of Week
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 34
Actual Use Case – Mobile Fraud
Activities:
• Login Failed (Bad
Credentials)
• Login Failed (User Locked)
Risk Factors:
• Operating System or
Browser Changes
• User Agent String Change
• Unusual Browser
Configuration
• Unusual Location
• New Location
• Network Provider
State remained the same with different city (usually this is not
suspicious), but as you scroll down you see a new provider, network
and OS/Browser. In this case it does provide you that an iPhone was
used, which has never been used for this particular account (normal
behavior for this account would be Windows 10 and Android).
Device Fingerprinting
User attributes
• Interaction Patterns
• Geolocation Velocity
• Time of Access
• Network Provider
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 35
Implementing Friction Right with IBM Trusteer
Actual Use Case
Customer
Login
Fraudster
Stolen
Credentials
Login
IBM Trusteer Pinpoint Risk Factors
Phished Credentials
Malware Infections
(stolen credentials)
①
IBM Trusteer Pinpoint
Real-time Platform Integration
Transactions
Risk Factors
ACH ODFI/RDFI
• New Recipient Velocity
• New Beneficiary Location
• New Beneficiary FI
• Batch SEC Code
• Transaction Code
• Batch Amount
• Batch Count
• …
③
② ③+
ATO, BEC
Fraudulent Instructions
NACHA Files
Manipulation
ACCEPT
HOLD
REJECT
ACCESS
DENIED
① ②+
Device Fingerprinting
Risk Factors
User attributes
• Interaction Patterns
• Geolocation Velocity
• Time of Access
• Network Provider
Device attributes
• UserAgent
• Language
• Color Depth
• Screen Resolution
• Full List of Installed Fonts
• A List of Installed Fonts
• Plugins
• OS/Browser
• …
②
Real-time API
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 36
Summary
FRICTION RIGHT PREVENTION
REAL-TIME INTERVENTION
FRICTION LESS FRAUD DETECTION
$
RISK ENGINE
• Friction Less Fraud Detection
• Friction Right Prevention
• Real-time Intervention
• Self-Learn Individual User’s Behavior
• Adapt to New Threats
• Do Not Depend on Rules
• Monitor Hundreds Events &
Attributes in Real-Time
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 37
Learn More
https://bit.ly/2KtcHPT https://bit.ly/2Mvap3h https://bit.ly/2lEr0Gz
https://bit.ly/2Ks8I9D https://bit.ly/2KeY4Um https://bit.ly/2tDrgdh
© 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 38
success@guardiananalytics.com
www.linkedin.com/company/guardiananalytics
www.youtube.com/user/GuardianAnalytics
@GuardAnalytics
Contact Us
Q&A

More Related Content

What's hot

New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
Guardian Analytics
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Guardian Analytics
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
Laurent Pacalin
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
Guardian Analytics
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
Guardian Analytics
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
Laurent Pacalin
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Guardian Analytics
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
Ken Lam
 
5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud
Chee Ming
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
Ken Lam
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
Hernan Huwyler
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
FraudBusters
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
Tyler Hannan
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 

What's hot (16)

New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network Presentation
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 

Similar to Preventing P2P Fraud with Aite Group

Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
Jérôme Kehrli
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Molly Alexander
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
Strategic Treasurer
 
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsLeveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Ricardo Ponce
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
Sucuri
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
Quan Risk
 
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
Bernard Marr
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
TransUnion
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Dataconomy Media
 
New Frontiers in Fraud Detection
New Frontiers in Fraud DetectionNew Frontiers in Fraud Detection
New Frontiers in Fraud Detection
Laurent Pacalin
 
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
TigerGraph
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
Jeremiah Grossman
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
Capgemini
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
Capgemini
 
Prep For Holiday Fraud In Money Movement & Finance Webinar Presentation
Prep For Holiday Fraud In Money Movement & Finance Webinar PresentationPrep For Holiday Fraud In Money Movement & Finance Webinar Presentation
Prep For Holiday Fraud In Money Movement & Finance Webinar Presentation
Kount
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)
Earnest Sweat
 
Software Advice IndustryView: SMB Readiness for Bitcoin
Software Advice IndustryView: SMB Readiness for BitcoinSoftware Advice IndustryView: SMB Readiness for Bitcoin
Software Advice IndustryView: SMB Readiness for Bitcoin
Software Advice
 
Sagepay Online Payment trends
Sagepay Online Payment trendsSagepay Online Payment trends
Sagepay Online Payment trends
Screen Pages
 
Law Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpLaw Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can Help
immixGroup
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
Insights success media and technology pvt ltd
 

Similar to Preventing P2P Fraud with Aite Group (20)

Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsLeveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
 
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
 
New Frontiers in Fraud Detection
New Frontiers in Fraud DetectionNew Frontiers in Fraud Detection
New Frontiers in Fraud Detection
 
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
 
Prep For Holiday Fraud In Money Movement & Finance Webinar Presentation
Prep For Holiday Fraud In Money Movement & Finance Webinar PresentationPrep For Holiday Fraud In Money Movement & Finance Webinar Presentation
Prep For Holiday Fraud In Money Movement & Finance Webinar Presentation
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)
 
Software Advice IndustryView: SMB Readiness for Bitcoin
Software Advice IndustryView: SMB Readiness for BitcoinSoftware Advice IndustryView: SMB Readiness for Bitcoin
Software Advice IndustryView: SMB Readiness for Bitcoin
 
Sagepay Online Payment trends
Sagepay Online Payment trendsSagepay Online Payment trends
Sagepay Online Payment trends
 
Law Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpLaw Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can Help
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
 

More from Laurent Pacalin

Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
Laurent Pacalin
 
Blockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaperBlockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaper
Laurent Pacalin
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
Laurent Pacalin
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
Laurent Pacalin
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
Laurent Pacalin
 
Insight driven infographic
Insight driven infographicInsight driven infographic
Insight driven infographic
Laurent Pacalin
 
Retail Banking Infographics
Retail Banking InfographicsRetail Banking Infographics
Retail Banking Infographics
Laurent Pacalin
 
Oracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productiveOracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productive
Laurent Pacalin
 
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales CloudHitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Laurent Pacalin
 
Modern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales CloudModern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales Cloud
Laurent Pacalin
 
Oracle Sales Cloud Release 9 by Ventana Research
Oracle Sales Cloud Release 9  by Ventana ResearchOracle Sales Cloud Release 9  by Ventana Research
Oracle Sales Cloud Release 9 by Ventana Research
Laurent Pacalin
 
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus ResearchBenefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
Laurent Pacalin
 
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with ConemisMigrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Laurent Pacalin
 

More from Laurent Pacalin (13)

Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 
Blockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaperBlockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaper
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Insight driven infographic
Insight driven infographicInsight driven infographic
Insight driven infographic
 
Retail Banking Infographics
Retail Banking InfographicsRetail Banking Infographics
Retail Banking Infographics
 
Oracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productiveOracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productive
 
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales CloudHitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
 
Modern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales CloudModern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales Cloud
 
Oracle Sales Cloud Release 9 by Ventana Research
Oracle Sales Cloud Release 9  by Ventana ResearchOracle Sales Cloud Release 9  by Ventana Research
Oracle Sales Cloud Release 9 by Ventana Research
 
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus ResearchBenefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
 
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with ConemisMigrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
 

Recently uploaded

Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 

Recently uploaded (20)

Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 

Preventing P2P Fraud with Aite Group

  • 1. Shirley Inscoe – Senior Analyst Aite Group Eric Tran-Le - Vice President Product Management How to Prevent Peer-to-Peer Payment Fraud in Real-time
  • 2. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 2©2018 Aite Group LLC.Page 2 Shirley Inscoe Senior Analyst sinscoe@aitegroup.com +1.617.398.5050 www.aitegroup.com Aite (pronounced “eye-tay”) Group is an independent research and advisory firm focused on business, technology, and regulatory issues and their impact on the financial services industry. Visit us on the web and connect with us on Twitter and LinkedIn.
  • 3. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 3©2018 Aite Group LLC.Page 3 Agenda • Growing importance of mobile channel • Payment evolution • Impact on fraud prevention • How to combat real-time payment fraud • Key takeaways
  • 4. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 4©2018 Aite Group LLC.Page 4 Faster payments have arrived; they are not a future event • Payments are evolving to keep up with market demand • Payments are becoming faster and can be initiated via mobile – the device of choice • Fraud always attacks new payment methods; that is to be expected and planned for • Most FIs are not ready for real- time payments, so must prepare Mobile-first is consumers’ choice
  • 5. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 5©2018 Aite Group LLC.Page 5 Digital P2P Payments Market Snapshot $100.3 $147.1 $178.2 $215.8 $261.4 $316.6 2015 2016 e2017 e2018 e2019 e2020 Digital P2P Payment Market Snapshot, 2015 to e2020 (In US$ billions) Source: Aite Group
  • 6. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 6©2018 Aite Group LLC.Page 6 Payments are evolving, accelerating… • New payment types are surfacing quickly in the market - Designed to meet the needs of both consumers and businesses • Everyone wants in on the action - Apple Pay, Samsung Pay, Walmart Pay, Venmo • Payments are mobile, allowing payments to occur anywhere - Square Pay, Anywhere Commerce, Clover, PayPal Here, CardPointe • Cryptocurrencies are becoming more mainstream - Bitcoin, Litecoin, Ripple, Dash, Zcash, Monero
  • 7. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 7©2018 Aite Group LLC.Page 7 It is all about faster payments… • Payment speeds are accelerating - Same day ACH - Zelle – real time P2P o Over 100 FIs have implemented or committed to implement o FI doesn’t offer it? – simply download the Zelle app o Partnerships with core processors extends capability to smaller financial institutions • FIS, Fiserv, Jack Henry - The Clearing House’s Real Time Payments (RTP) o Payments originated by businesses o Incubator service with FIS o SWIFT gateway makes payment railway accessible - Payment hubs increasingly used for least-cost routing
  • 8. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 8©2018 Aite Group LLC.Page 8 Payments competition is increasing rapidly RTP • Competitors are entering the market to take advantage of payments demand • Some players are owned by FIs, but many are not • Consumers and businesses want payments they can trust and that are secure • FI-controlled payments may be more secure due to prior fraud experience • Innovation is needed, and consumers value ease of use; customer experience is very important during the adoption phase
  • 9. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 9©2018 Aite Group LLC.Page 9 Methodology Source: Aite Group interviews with 19 large North American FIs, July to September 2017 $25 to $99 37% $100 to $499 42% $500+ 21% Respondents by Asset Size (N=19; in US$ billions)
  • 10. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 10©2018 Aite Group LLC.Page 10 Digital channel losses are on the rise Source: Aite Group interviews with 19 large North American FIs, July to September 2017 Up 74% Flat 21% Down 5% Q. Are your online/mobile fraud losses trending up, down, or are they flat over the past 2 years? (N=19)
  • 11. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 11©2018 Aite Group LLC.Page 11 Fraudsters never give up… No matter what measures are taken, fraudsters will find a new method… Fraud prevention measures cannot be stagnant, but must change to meet current market demands.
  • 12. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 12©2018 Aite Group LLC.Page 12 The bad guys use a variety of tactics Source: Aite Group interviews with 19 large North American FIs, July to September 2017 89% 42% 32% 32% 21% 16% 5% 5% ATO Application fraud/ ID theft/ synthetics mRDC First-party fraud/scams CNP fraud Money movement ACH ATM cashout Q. What are the top 3 types of losses being incurred in digital channels? (N=19)
  • 13. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 13©2018 Aite Group LLC.Page 13 Authentication is the foundation for fraud prevention • You must be able to determine: • Is this applicant a real person or a bot? • Is this a real person or a synthetic identity? • Is this person who they claim to be? • Is this person a known fraudster? • Is this person registering for Zelle my good customer or an impersonator? • Is the person initiating a Zelle transfer to a new payee my true customer or an account takeover fraudster? Doing this to some degree 26% Do a form of this; needs improvement 32% Not doing this, but plan to 10% Not doing this at all 32% Q. How is your FI working to orchestrate authentication, if at all? (N=19) Source: Aite Group interviews with 19 large North American FIs, July to September 2017
  • 14. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 14©2018 Aite Group LLC.Page 14 FI fraud prevention moves to mobile-first The mobile device can serve as the foundation for authentication in… All channels, including: • Online • Contact centers • POS Aspects of authentication: • Device fingerprinting • Biometrics on device • Geolocation • One-time passwords • Mobile network operator data • Behavioral biometrics
  • 15. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 15©2018 Aite Group LLC.Page 15 Transparent methods improve the customer experience • Device fingerprinting • Behavioral analytics • Behavioral biometrics Customer experience is more important than ever before and can determine whether new fraud solutions are approved or not.
  • 16. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 16©2018 Aite Group LLC.Page 16 The quest: Optimizing the balance between risk and friction Seamless experience Device identity KBA Fingerprint biometric SMS OTP Identity data verification Token 2-D facial recognition 3-D facial recognition Mobile app push Device malware Identity document verification Eye vein biometric High Medium Low Behavior patterns Behavioral biometrics Level of security Username password High friction Iris biometric
  • 17. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 17©2018 Aite Group LLC.Page 17 Internal data, reconnaissance detection Transparent solutions ( e.g. device identity, behavioral analytics, behavioral biometrics) Stepped-up authentication (e.g. biometrics, one-time passwords) Login security (e.g. biometrics, dynamic credentials) A layered approach to security is essential. The challenge: Making it holistic
  • 18. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 18©2018 Aite Group LLC.Page 18 It’s a brave new world of financial crimes • Old fashioned fraud & money laundering techniques are inadequate - Rules based models can still be useful, but are not enough - Real-time detection is necessary to avoid large losses or huge regulatory fines - Interdiction capability is required to stop transactions in real time • Machine learning models continuously improve based on feedback - Can help reduce false positives significantly - Supervised models are best accepted by regulators (early days) • Tailor fraud and AML detection to meet payment windows - Suspend, decision, release or delete - Prioritize alerts based on risk level - Consider auto-decisioning once confidence in model is established - Ensure no discriminatory effects from models
  • 19. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 19©2018 Aite Group LLC.Page 19 Key takeaways • The threat environment continues to escalate; EMV, faster payments, ongoing data breaches, and increased mobile functionality will only up the ante • The mobile device, properly enabled, can add much value in combatting fraud • Financial institutions must have sound strategies to implement real time payments or fraud will mushroom • Ensure your fraud processes are easily adaptable, fraud can change quickly, and you must be able to make adjustments • Review your authentication strategies and update customer contact information as part of your faster payments implementation process • Don’t employ too much friction; transparent solutions can enable strong security as well as a great customer experience
  • 20. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 20 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporate into any contract. It is not a commitment to deliver any material, code, or functionality and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Guardian Analytics’ products remains at the sole discretion of Guardian Analytics
  • 21. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 21 What Does Guardian Analytics Do • Alert Fraud Operation Team • Stop Fraudulent Account Activities • Detect Fraud Risk Through Behavioral Analytics
  • 22. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 22 • Self-Learn Individual User’s Behavior • Detect Anomalous User Activities • Adapt to New Threats • Do Not Depend on Rules • Monitor Hundreds Events & Attributes in Real-Time Detect Fraud with Behavioral Analytics
  • 23. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 23 Financial institutions Commercial & retail account holders Banking activities 450 40M 5B Guardian Analytics at a Glance
  • 24. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 24 Optimal The Balance Between Risk and Friction for Payments Seamless experience Device identity KBA Fingerprint biometric SMS OTP Identity data verification Token 2-D facial recognition 3-D facial recognition Mobile app push Device malware Identity document verification Eye vein biometric High Medium Low Behavior patterns Behavioral biometrics Level of security Username password High friction Iris biometric Behavioral Biometrics is about identifying people by how they do what they do rather than by what they are (e.g. fingerprint, face) or what they know (secret question, password) or what they have (token, SMS one-time code) Behavioral Biometrics Behavioral Patterns Behavioral Patterns is designed to understand the normal behavior of each individual account holder, calculate the risk of each new activity and enable real-time intervention commensurate to the risk A Device Fingerprint is a set of information collected about a device or user profile. The goal is to create a digital identity which can be used as the fingerprint of a mobile or desktop device
  • 25. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 25 Enabling Friction Right & Real-time Intervention FRICTION RIGHT PREVENTION REAL-TIME INTERVENTION FRICTION LESS FRAUD DETECTION $ RISK ENGINE • Friction Less Fraud Detection • Friction Right Prevention • Real-time Intervention • Self-Learn Individual User’s Behavior • Adapt to New Threats • Do Not Depend on Rules • Monitor Hundreds Events & Attributes in Real-Time
  • 26. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 26 Faster Payments and Friction Less • Temporary employee wages • Emergency payroll • Urgent B2C (Disaster relief) Utilities, DMV,… charitable organizations receive funds into their account Person-to-Business(P2B)• Immediate bill payments • E-commerce purchases • Just-in-time payment to suppliers • Immediate bill payments Business-to-Business(B2B) Suppliers receive funds transfers to their accounts directly $ Customer RECEIVES $ IN MINUTES using P2P Service $ Person-to-Person(P2P) • Non-commerce payments • Account-to- Account transfers • Payment for information services Business-to-Person(B2P) Workers receive funds transfers to their accounts directly Friction Less
  • 27. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 27 Example: P2P ACH Funds Transfer in a Nutshell Bank A P2P Service Participant Bank B P2P Service Participant 1- Bank A • Debit Customer 1 acct. of $150 • Message P2P Service Provider • Funds moved to settlement account 2- Bank B • Credit Customer 2 acct. of $150 • Message P2P Service Provider 3- Bank A Settles with Bank B • Bank A ACH to Bank B in HOURS Customer 1 Account Linked $ Customer 1 SENDs Customer 2 $150 $ Customer 2 RECEIVES $150 in MINUTES Customer 2 Account Linked
  • 28. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 28 Method of Compromises Malware Online Account Take Over Phishing Email Compromise Device Account Take Over Bank A P2P Service Participant Bank B P2P Service Participant Customer 2 Account Linked Customer 1 Account Linked
  • 29. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 29 Guardian Analytics Friction Less User Experience FRICTION LESS Device Account Take Over Online Account Take Over
  • 30. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 30 Guardian Analytics Friction Right & Real-time Intervention FRICTION LESS FRICTION RIGHT REAL-TIME INTERVENTION Device Account Take Over Online Account Take Over Malware Phishing Email Compromise
  • 31. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 31 Current Guardian Analytics Use Cases FRICTION LESS FRICTION RIGHT REAL-TIME INTERVENTION P2B & P2P Platforms • Fiserv Checkfree (bill pay) • Fiserv Popmoney (P2P transfer) • Fiserv TransferNow (A2A transfer) Mobile Platform • Access Softkey, Fiserv – CFG SSB, ACI – Mobile Banking • ConnectFSS, Digital Insight - Digital Banking • Fiserv – Mobiliti, Jack Henry – NetTeller • Malauzai, Tyfone, Wescom Resources Group • ACI, Bottomline, Jack Henry Online Platform • Fiserv – Architect/CFG IBS/CDG SSB • ACI – LFIN/Universal Online Banker • ConnectFSS • Digital Insight – Digital Banking (Retail) • Fiserv- Corillian Online Hosted/Licensed • Fiserv - Retail Online/SecureNow(COASP) Wire Platform • Fiserv WireXchange • Fiserv Wire Manager • Fundtech PAYplus Connect (GFX) • Fundtech PAYPlus USA • Pathfinder WITS • Ocean Systems – Fedlink • Customers who can consume Wire API ACH Platform • ACI Enterprise Banker • Bottomline Business Banking • Fedline Advantage • First Data - FundsXpress • FIS ACH/BeB/CLK • Fiserv ACH Manager/DNAWeb/PEP+ • Fiserv Premier ACH • Finastra Fundtech ACH Plus • Jack Henry Goldleaf/Silverlake
  • 32. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 32 Actual Use Case 1. User Agent 2. Language 3. Color Depth 4. Screen Resolution 5. Timezone 6. Has session storage or not 7. Has local storage or not 8. Has indexed DB 9. Has IE specific ‘AddBehavior’ 10. Has open DB 11. CPU Class 12. Platform 13. DoNotTrack or not 14. Full list of installed fonts & order 15. A list of installed fonts 16. Canvas fingerprinting 17. WebGL fingerprinting 18. Plugins (IE included) 19. Is AdBlock installed or not 20. Has the user tampered with its languages 21. Has the user tampered with its screen resolution 22. Has the user tampered with its OS 23. Has the user tampered with is browser 24. Touch screen detection & capabilities 25. Pixel Ratio 26. System’s total number of logical processors available to user agent 27. Device memory Device fingerprinting gets around cookie-based privacy settings (e.g., Google's incognito mode)by instead relying on information that all browsers make readily available to client-side scripting languages like JavaScript. Information like operating system, TCI/IP configuration, and browser configuration. Guardian Analytics combines this information to create a semi-unique identification of online & mobile users Example of Device Fingerprinting
  • 33. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 33 Example of Authentication and Logins Risk Models Actual Use Case 20 15 10 5 0 HourofDay Day of Week 20 15 10 5 0 HourofDay Day of Week
  • 34. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 34 Actual Use Case – Mobile Fraud Activities: • Login Failed (Bad Credentials) • Login Failed (User Locked) Risk Factors: • Operating System or Browser Changes • User Agent String Change • Unusual Browser Configuration • Unusual Location • New Location • Network Provider State remained the same with different city (usually this is not suspicious), but as you scroll down you see a new provider, network and OS/Browser. In this case it does provide you that an iPhone was used, which has never been used for this particular account (normal behavior for this account would be Windows 10 and Android). Device Fingerprinting User attributes • Interaction Patterns • Geolocation Velocity • Time of Access • Network Provider
  • 35. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 35 Implementing Friction Right with IBM Trusteer Actual Use Case Customer Login Fraudster Stolen Credentials Login IBM Trusteer Pinpoint Risk Factors Phished Credentials Malware Infections (stolen credentials) ① IBM Trusteer Pinpoint Real-time Platform Integration Transactions Risk Factors ACH ODFI/RDFI • New Recipient Velocity • New Beneficiary Location • New Beneficiary FI • Batch SEC Code • Transaction Code • Batch Amount • Batch Count • … ③ ② ③+ ATO, BEC Fraudulent Instructions NACHA Files Manipulation ACCEPT HOLD REJECT ACCESS DENIED ① ②+ Device Fingerprinting Risk Factors User attributes • Interaction Patterns • Geolocation Velocity • Time of Access • Network Provider Device attributes • UserAgent • Language • Color Depth • Screen Resolution • Full List of Installed Fonts • A List of Installed Fonts • Plugins • OS/Browser • … ② Real-time API
  • 36. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 36 Summary FRICTION RIGHT PREVENTION REAL-TIME INTERVENTION FRICTION LESS FRAUD DETECTION $ RISK ENGINE • Friction Less Fraud Detection • Friction Right Prevention • Real-time Intervention • Self-Learn Individual User’s Behavior • Adapt to New Threats • Do Not Depend on Rules • Monitor Hundreds Events & Attributes in Real-Time
  • 37. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 37 Learn More https://bit.ly/2KtcHPT https://bit.ly/2Mvap3h https://bit.ly/2lEr0Gz https://bit.ly/2Ks8I9D https://bit.ly/2KeY4Um https://bit.ly/2tDrgdh
  • 38. © 2018 Guardian Analytics. All Rights Reserved - How to Prevent P2P Fraud in Real-time 38 success@guardiananalytics.com www.linkedin.com/company/guardiananalytics www.youtube.com/user/GuardianAnalytics @GuardAnalytics Contact Us Q&A