SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
+1-888-690-2424
entrust@entrust.com
entrust.com/financial-institutions

Entrust TransactionGuard for
Real-Time Fraud Detection

@Entrust

Detecting & Defeating Cross-Channel Fraud

/EntrustVideo

Advanced cyberthreats targeting global and national financial institutions
are growing in frequency and sophistication. Regulatory and market
pressures, regardless of geographic region, further strain banks’ ability
to dedicate the necessary time and resources to properly defend against
malicious malware and advanced fraud threats.

/EntrustSecurity

With a long-standing focus on the authentication and fraud market,
Entrust helps globally trusted FIs fight fraud in real-time with the most
comprehensive fraud-monitoring framework that provides the
deployment flexibility to monitor transactions across varied applications,
user communities and multiple access channels.

+entrust

DOWNLOAD
THIS DATA SHEET

Solution Benefits

šš

Detect, Defend & Adapt

Unlike competitive offerings limited
to transaction-based fraud detection,
Entrust TransactionGuard analyzes all points
of interaction with the user on a website,
allowing organizations to gain a complete
picture of potentially fraudulent behavior.
The zero-touch approach enables rapid
deployment into complex environments,
no invasive integration with banking
applications, and does not impact the
end-user experience.

šš

Provides comprehensive fraudmonitoring for user and
transaction anomalies

šš

Enables real-time, risk-score calculations
to immediately detect and stop
advanced fraud attacks

šš

Offers unmatched deployment
flexibility to tie seamlessly into
complex IT environments and
quickly react to new attack vectors

šš

Includes Rich APIs to integrate and
co-deploy with existing authentication
and fraud detection solutions as required
for a smooth migration strategy

šš

Delivers integrated case management,
forensic and reporting capabilities that
span the entire transaction session

Zero-Touch Security

Entrust TransactionGuard has evolved from
a real-time, transaction-monitoring system
to a state-of-the-art platform that blends
a number of approaches for an integrated
framework to help financial institutions
detect, defend and adapt to the fast-paced
fraud landscape.

Integrates with Entrust IdentityGuard
to form a comprehensive security
framework that helps address
regulatory guidelines for layered
security protection

Integrating Strong
Authentication
Entrust TransactionGuard works seamlessly
with Entrust IdentityGuard to layer security
— according to access requirements or the
risk of a given transaction — across diverse
users and applications. Detect fraud without
invasive integration with existing online
applications and step-up authentication
controls only when dictated by elevated risks.
uu
entrust.com/authentication

Regulatory Compliance
Coupled with Entrust IdentityGuard and
out-of-band transaction verification,
Entrust TransactionGuard provides
unmatched layered security that’s aligned
to the recommendations of the Federal
Financial Institutions Examination Council
(FFIEC) and leading FI security analyst firms.
Entrust TransactionGuard for Real-Time Fraud Detection
Detecting & Defeating Cross-Channel Fraud

  Real-Time Fraud Solution Architecture

Optional
Data Injection
via API

www

Zero-Touch Web Servers
Passive Listener

Business
Applications

Fraud Analyst

Entrust
Open Fraud
Intelligence
Network

Transaction
Monitoring

Optional Risk-Based Authentication

SOLUTION ARCHITECTURE
Comprehensive security for FIs. Entrust provides a proven architecture that delivers real-time fraud detection, risk-based authentication and critical information-sharing capabilities.

Solving a Complex Challenge
FIs are still learning to manage the explosive growth of the online
and mobile channels — and how to best secure related access and
transactions. These challenges are compounded by the complex
nature of existing fraud detection and security infrastructures
— typically silo approaches with separate, single-purpose solutions
that only analyze fraud from a narrow point of view.
More than “Front-Door” Monitoring
Entrust’s fraud-detection solution provides detailed “front-door”
monitoring from the moment a user hits the website to full “in-session”
analysis with the ability to monitor both transactional data and
underlying HTTP(S) access data.
This information includes navigation speeds and patterns, IP address
anomalies, and even detection of user-agent strings and HTML-injection
attacks. A truly comprehensive fraud-monitoring approach to detect
and defend against today’s most sophisticated attack vectors.

Real-Time Transaction Interdiction
Entrust provides real-time protection by transparently monitoring
user behavior to identify anomalies, then calculating the risk
associated with a particular transaction. If a risk is identified, step-up
authentication can be automatically invoked — leveraging
Entrust IdentityGuard — to complete the transaction.
This not only eliminates the need for fraud analysts to manually
contact customers, but helps ensure smooth, immediate transaction
completion improving the end-customer experience.
Proactive Malware & MITB Safeguards
High-risk transactions are managed according to business procedure
and the level of risk in real-time. Alert generation, case reporting
and workflow tools enable an organization to investigate and stop
fraudulent transactions before they clear or approve legitimate
business, without impacting the user — all necessary tools to help
stop man-in-the-browser attacks.
Enterprise-Wide Fraud Framework
Entrust TransactionGuard monitors an array of varied applications across the enterprise, each
supporting a distinct (or shared) fraud model. Leveraging a single tool to manage and monitor
fraud, across the enterprise, provides economies of scale. This empowers each application
owner to build a fraud model tuned to specific business characteristics and needs.

Cross-Channel Monitoring

Deep Fraud Analysis

As banks consolidate varied access channels to an XML/HTTPcentralized view of client activity, Entrust TransactionGuard
can monitor fraud across each separate channel. The solution’s
powerful HTTP-monitoring can extract countless data elements.

Entrust TransactionGuard offers an embedded case-management
module that provides fraud analysts with powerful tools to monitor
and investigate new fraud cases. The system supports group-based
policies so fraud teams only view and manage incidents related to
their customer base.

This capability provides unmatched flexibility on how to analyze
and detect anomalies across a broad range of HTTP-based channels
including online, mobile, ATM and others. Data may then be collated
across channels for true 360-degree insight to account activity.

Deployment Agility & Flexibility
Entrust TransactionGuard is offered in an on-premise deployment
model and provides customers with a range of options to meet the
needs of the most complex IT architecture. With a variety of options
to capture transactional data and integrate with third-party systems,
Entrust TransactionGuard provides the flexibility to implement
a new fraud framework with minimum IT impact and or requiring
the displacement of existing systems.

Included comprehensive tools enable deep insight to fraud threats
for individual user accounts or across the entire user population.
Entrust TransactionGuard can exchange (i.e., import and export)
data with external fraud systems, ensuring that disparate fraudmonitoring solutions are integrated to a single framework for
managing online fraud.

Rich API Abilities
For organizations with challenging data center requirements,
application nuances or a need to integrate external system data,
Entrust TransactionGuard supports rich fraud APIs that enable
transactional data, external feeds or third-party fraud alerts to
be injected into the fraud model.

Contingency Capabilities
The solution incorporates native server-redundancy, disaster-recovery
and load-balancing capabilities. It provides an architecture that meets
the most demanding scalability requirements across a range of
disparate user groups, business applications and geographic locations.

Speed & Adaptation
With today’s fraud landscape changing at an incredible pace, it is
even more important that a proven fraud detection solution evolves
and adapts quickly to meet ever-changing requirements. Entrust’s
solution provides incredible system agility — whether to deploy
a fraud mitigation technique to defend against a new threat vector
or to distribute a new authentication mechanism to a large user base
without a whole-scale system change.

Easy Integration
Quickly introduce new applications and start monitoring fraud rapidly.
Entrust TransactionGuard zero-touch monitoring allows transactional
data to be monitored without complex or expensive direct integration
to banking applications or deployment on end-user endpoints. Adding
new applications or incorporating new data feeds is a quick process
providing banks with the agility to stay on top of fraud threats.

Behavior Patterns
Entrust TransactionGuard includes an out-of-the-box library
of behavior pattern baselines and supports easily customizable
business rules, including the ability to download on-going updates
posted on the Entrust Open Fraud Intelligence Network (OFIN)
website. This helps significantly decrease the time between initial
deployment and full operation.
Entrust TransactionGuard for Real-Time Fraud Detection
Detecting & Defeating Cross-Channel Fraud

Real-Time Monitoring & Risk Control
Entrust TransactionGuard transparently monitors user behavior to identify anomalies, then
calculates the risk associated with a particular transaction — all seamlessly and in real time.
Using customizable, pre-built fraud rules and transaction signatures, the solution helps
identify anomalies such as:

šš

A user login from an unknown machine

šš

A user login from a risky IP address

šš

A user login from unknown locations or unlikely distances

šš

Transaction executions that are unusual for the user or part of a suspicious
system-wide pattern

šš

Varied man-in-the-browser attack vectors — in real time

Entrust provides
real-time protection
by transparently
monitoring user
behavior to identify
anomalies, then
calculating the risk
associated with a
particular transaction.
 

Monitor retail, mobile and commercial banking, and even any internally facing Web-based
applications, simultaneously and in real-time. All analysis is done transparently, is instantaneous
and does not require the application to be changed in any way or cause extra burden on the user.

A trusted provider of identity-based security solutions, Entrust secures governments,
enterprises and financial institutions in more than 5,000 organizations spanning
85 countries.
Entrust’s award-winning software authentication platforms manage today’s most secure
identity credentials, addressing customer pain points for cloud and mobile security,
physical and logical access, citizen eID initiatives, certificate management and SSL.
For more information about Entrust products and services, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com.

Company Facts
Website: www.entrust.com
Employees: 359
Customers: 5,000
Offices: 10 globally
Headquarters
Three Lincoln Centre
5430 LBJ Freeway, Suite 1250
Dallas, TX 75240 USA

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust
product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos
are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved.
22677/2-14

Mais conteúdo relacionado

Mais de Entrust Datacard

Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? Entrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Mais de Entrust Datacard (8)

Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Entrust TransactionGuard for Real-Time Fraud Detection

  • 1. +1-888-690-2424 entrust@entrust.com entrust.com/financial-institutions Entrust TransactionGuard for Real-Time Fraud Detection @Entrust Detecting & Defeating Cross-Channel Fraud /EntrustVideo Advanced cyberthreats targeting global and national financial institutions are growing in frequency and sophistication. Regulatory and market pressures, regardless of geographic region, further strain banks’ ability to dedicate the necessary time and resources to properly defend against malicious malware and advanced fraud threats. /EntrustSecurity With a long-standing focus on the authentication and fraud market, Entrust helps globally trusted FIs fight fraud in real-time with the most comprehensive fraud-monitoring framework that provides the deployment flexibility to monitor transactions across varied applications, user communities and multiple access channels. +entrust DOWNLOAD THIS DATA SHEET Solution Benefits šš Detect, Defend & Adapt Unlike competitive offerings limited to transaction-based fraud detection, Entrust TransactionGuard analyzes all points of interaction with the user on a website, allowing organizations to gain a complete picture of potentially fraudulent behavior. The zero-touch approach enables rapid deployment into complex environments, no invasive integration with banking applications, and does not impact the end-user experience. šš Provides comprehensive fraudmonitoring for user and transaction anomalies šš Enables real-time, risk-score calculations to immediately detect and stop advanced fraud attacks šš Offers unmatched deployment flexibility to tie seamlessly into complex IT environments and quickly react to new attack vectors šš Includes Rich APIs to integrate and co-deploy with existing authentication and fraud detection solutions as required for a smooth migration strategy šš Delivers integrated case management, forensic and reporting capabilities that span the entire transaction session Zero-Touch Security Entrust TransactionGuard has evolved from a real-time, transaction-monitoring system to a state-of-the-art platform that blends a number of approaches for an integrated framework to help financial institutions detect, defend and adapt to the fast-paced fraud landscape. Integrates with Entrust IdentityGuard to form a comprehensive security framework that helps address regulatory guidelines for layered security protection Integrating Strong Authentication Entrust TransactionGuard works seamlessly with Entrust IdentityGuard to layer security — according to access requirements or the risk of a given transaction — across diverse users and applications. Detect fraud without invasive integration with existing online applications and step-up authentication controls only when dictated by elevated risks. uu entrust.com/authentication Regulatory Compliance Coupled with Entrust IdentityGuard and out-of-band transaction verification, Entrust TransactionGuard provides unmatched layered security that’s aligned to the recommendations of the Federal Financial Institutions Examination Council (FFIEC) and leading FI security analyst firms.
  • 2. Entrust TransactionGuard for Real-Time Fraud Detection Detecting & Defeating Cross-Channel Fraud   Real-Time Fraud Solution Architecture Optional Data Injection via API www Zero-Touch Web Servers Passive Listener Business Applications Fraud Analyst Entrust Open Fraud Intelligence Network Transaction Monitoring Optional Risk-Based Authentication SOLUTION ARCHITECTURE Comprehensive security for FIs. Entrust provides a proven architecture that delivers real-time fraud detection, risk-based authentication and critical information-sharing capabilities. Solving a Complex Challenge FIs are still learning to manage the explosive growth of the online and mobile channels — and how to best secure related access and transactions. These challenges are compounded by the complex nature of existing fraud detection and security infrastructures — typically silo approaches with separate, single-purpose solutions that only analyze fraud from a narrow point of view. More than “Front-Door” Monitoring Entrust’s fraud-detection solution provides detailed “front-door” monitoring from the moment a user hits the website to full “in-session” analysis with the ability to monitor both transactional data and underlying HTTP(S) access data. This information includes navigation speeds and patterns, IP address anomalies, and even detection of user-agent strings and HTML-injection attacks. A truly comprehensive fraud-monitoring approach to detect and defend against today’s most sophisticated attack vectors. Real-Time Transaction Interdiction Entrust provides real-time protection by transparently monitoring user behavior to identify anomalies, then calculating the risk associated with a particular transaction. If a risk is identified, step-up authentication can be automatically invoked — leveraging Entrust IdentityGuard — to complete the transaction. This not only eliminates the need for fraud analysts to manually contact customers, but helps ensure smooth, immediate transaction completion improving the end-customer experience. Proactive Malware & MITB Safeguards High-risk transactions are managed according to business procedure and the level of risk in real-time. Alert generation, case reporting and workflow tools enable an organization to investigate and stop fraudulent transactions before they clear or approve legitimate business, without impacting the user — all necessary tools to help stop man-in-the-browser attacks.
  • 3. Enterprise-Wide Fraud Framework Entrust TransactionGuard monitors an array of varied applications across the enterprise, each supporting a distinct (or shared) fraud model. Leveraging a single tool to manage and monitor fraud, across the enterprise, provides economies of scale. This empowers each application owner to build a fraud model tuned to specific business characteristics and needs. Cross-Channel Monitoring Deep Fraud Analysis As banks consolidate varied access channels to an XML/HTTPcentralized view of client activity, Entrust TransactionGuard can monitor fraud across each separate channel. The solution’s powerful HTTP-monitoring can extract countless data elements. Entrust TransactionGuard offers an embedded case-management module that provides fraud analysts with powerful tools to monitor and investigate new fraud cases. The system supports group-based policies so fraud teams only view and manage incidents related to their customer base. This capability provides unmatched flexibility on how to analyze and detect anomalies across a broad range of HTTP-based channels including online, mobile, ATM and others. Data may then be collated across channels for true 360-degree insight to account activity. Deployment Agility & Flexibility Entrust TransactionGuard is offered in an on-premise deployment model and provides customers with a range of options to meet the needs of the most complex IT architecture. With a variety of options to capture transactional data and integrate with third-party systems, Entrust TransactionGuard provides the flexibility to implement a new fraud framework with minimum IT impact and or requiring the displacement of existing systems. Included comprehensive tools enable deep insight to fraud threats for individual user accounts or across the entire user population. Entrust TransactionGuard can exchange (i.e., import and export) data with external fraud systems, ensuring that disparate fraudmonitoring solutions are integrated to a single framework for managing online fraud. Rich API Abilities For organizations with challenging data center requirements, application nuances or a need to integrate external system data, Entrust TransactionGuard supports rich fraud APIs that enable transactional data, external feeds or third-party fraud alerts to be injected into the fraud model. Contingency Capabilities The solution incorporates native server-redundancy, disaster-recovery and load-balancing capabilities. It provides an architecture that meets the most demanding scalability requirements across a range of disparate user groups, business applications and geographic locations. Speed & Adaptation With today’s fraud landscape changing at an incredible pace, it is even more important that a proven fraud detection solution evolves and adapts quickly to meet ever-changing requirements. Entrust’s solution provides incredible system agility — whether to deploy a fraud mitigation technique to defend against a new threat vector or to distribute a new authentication mechanism to a large user base without a whole-scale system change. Easy Integration Quickly introduce new applications and start monitoring fraud rapidly. Entrust TransactionGuard zero-touch monitoring allows transactional data to be monitored without complex or expensive direct integration to banking applications or deployment on end-user endpoints. Adding new applications or incorporating new data feeds is a quick process providing banks with the agility to stay on top of fraud threats. Behavior Patterns Entrust TransactionGuard includes an out-of-the-box library of behavior pattern baselines and supports easily customizable business rules, including the ability to download on-going updates posted on the Entrust Open Fraud Intelligence Network (OFIN) website. This helps significantly decrease the time between initial deployment and full operation.
  • 4. Entrust TransactionGuard for Real-Time Fraud Detection Detecting & Defeating Cross-Channel Fraud Real-Time Monitoring & Risk Control Entrust TransactionGuard transparently monitors user behavior to identify anomalies, then calculates the risk associated with a particular transaction — all seamlessly and in real time. Using customizable, pre-built fraud rules and transaction signatures, the solution helps identify anomalies such as: šš A user login from an unknown machine šš A user login from a risky IP address šš A user login from unknown locations or unlikely distances šš Transaction executions that are unusual for the user or part of a suspicious system-wide pattern šš Varied man-in-the-browser attack vectors — in real time Entrust provides real-time protection by transparently monitoring user behavior to identify anomalies, then calculating the risk associated with a particular transaction.   Monitor retail, mobile and commercial banking, and even any internally facing Web-based applications, simultaneously and in real-time. All analysis is done transparently, is instantaneous and does not require the application to be changed in any way or cause extra burden on the user. A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Company Facts Website: www.entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX 75240 USA Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved. 22677/2-14