The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite

IBM Security
IBM SecurityIBM Security
© 2016 IBM Corporation
Fighting digital banking fraud
objectives & challenges
2© 2016 IBM Corporation
So many ways to commit fraud and account takeover
January 2015
Bank Fraud Toolkit Circumvents
2FA and Device Identification
Use stolen credentials
Phishing / Criminal Device
Steal Personally
Identifiable Information
Steal
Credentials
Automated
Transaction
Man-in-the-Browser MalwarePharming
- Redirect
- Overlay
Landing
Page
Login
Page
My
Information
Website
Remote Control Tools
Ride the session
Transaction
3© 2016 IBM Corporation
Anatomy of a Dyre Attack
Fake Banking Website Banking WebsitePhishing Email
1 2 3 4 5 6
Navigation
to online
banking website
Victim’s device
gets infected with
malware
Credentials and
PII
are sent
to criminal
Dyre diverts user
to fake website
Money transfer to
mule account
Login
to online banking
4© 2016 IBM Corporation
Current fraud prevention solutions are failing
!  Accuracy – high false positive alerts
and actual fraud often missed
!  Adaptability – cannot react to new
threats and new attack methods
!  Cost – maintenance / updates / modifications
are very expensive
!  Collaboration – data not shared between
installed solutions
!  Convenience – negative impact on customer
Fraud
operation
costs
Authentication
challenges
Transaction
delays
Account
Suspensions
Solution shortcomings… cause critical problems
5© 2016 IBM Corporation
“Vision is the art of seeing what is invisible to others.”
Jonathan Swift
© 2016 IBM Corporation
Trusteer Approach
technology & intelligence
7© 2016 IBM Corporation
Trusteer approach vs. traditional fraud controls
Fraud detection that works for your business
•  Unparalleled accuracy
evidence-based detection, leveraging
global threat intelligence network
•  Built-in adaptability & agility
always up-to-date, seamlessly adjusted to
new-threat, fueled by innovative Big Data
technologies and world-class threat experts
•  Extreme operational scalability
cloud-based operation, linearly grows with
your business, processing in real-time
virtually any number of sessions/day
•  Seamless user experience
online & mobile channels actionable real-
time risk assessment
•  Ease of integration
simple, standardized across Trusteer
solutions
End-userexperience
Fraud detection
Pinpoint
(cloud)
one-time
password
static
password
biometrics
risk-engine
(statistical)
Rapport
(end-point)
Trusteer protection controls
Traditional protection controls
Effectiveness trend over time
?
8© 2016 IBM Corporation
Trusteer threat intelligence network
the largest actionable fraud intelligence network worldwide
USERS
ATTACKSDEFENSES
always up-to-date • push & pull • shared
9© 2016 IBM Corporation
network feeders & brain
dynamically fed, intelligence-driven
USERS
ATTACKSDEFENSES
application
Smart sensors
Trusteer
attack
researchEnd-point
Smart sensors
3rd party
Intelligence
suppliers
Trusteer
defense
research
customers’ own
intelligence
big data & analytics
technologies
100s infections/day
100Ms sessions/day
MOs, targets,
accounts, fraudsters
daily defense
update
pattern recognition
10© 2016 IBM Corporation
Trusteer intelligence lifecycle
volume & velocity
USERS
ATTACKSDEFENSES
collect data • identify new threat • research attack • develop defense • protect
all the time
all over the world
new threat-to-protect measured in hours
11© 2016 IBM Corporation
Trusteer solutions - fighting digital fraud
smart dynamic agents – collecting, detecting & protecting - across the access chain
Mobile SDK & secure browser
mobile application & device protection
Rapport
end-point protection
UDERS
ATTACKSDEFENSES
Fraud protection suite
digital fraud protection & lifecycle management
Pinpoint malware detection
snippet-based man-in-the-browser MW infection alert
new! app /
server
end
point
threat intelligence network
accesschain
© 2016 IBM Corporation
What’s new
13© 2016 IBM Corporation
What’s New
Pinpoint Detect
Pinpoint
Detect
Remediate
Pinpoint
Criminal
Detection
Pinpoint
Malware
Detection
Rapport for
Mitigation
Access
Management
(ISAM)
Case
Management
(CFM)
+ lifecycle management solution
unified detection
2
1
Trusteer Fraud
Protection Suite
14© 2016 IBM Corporation
IBM Security Trusteer Fraud Protection Suite
Key benefits
FRAUD
PROTECTION
SUITE
new!
next-gen dynamic accurate fraud detection
compromised identities & unauthorized access
threat-aware access management
dynamic risk assessment feed & recommendation
advanced case & event management
streamline investigation and threat analysis
powerful remediation tool
easily protect infected end-points
15© 2016 IBM Corporation
Pinpoint detect – digital fraud detection
ultimate coverage & new threats agility
USERS
ATTACKSDEFENSES
•  Remote Access Tool (RAT)
•  Malware-driven account takeover
•  Malware-driven man-in-the-browser / man-in-the-middle
•  Phishing & pharming
•  New variation MOs & defenses: Dridex, Zeus, Bugat, etc.
•  … new threats defenses updated daily, at no extra charge
16© 2016 IBM Corporation
Pinpoint detect – digital fraud detection
unparalleled efficacy & accuracy for all types of digital fraud
USERS
ATTACKSDEFENSES
user profile +
attack specs +
app-level defense
current
session data
risk
Unparalleled
accuracy
Pinpoint detect is so accurate because it is the only solution that has
intelligence-based real-time risk assessment against attack & user profile
application-aware defense policy
direct & redirect channel cross-check
- risk score
- risk reason
- device details (device ID)
- account details (encrypted UID)
- recommendation (allow/ authenticate/ allow & restrict)
App
server
17© 2016 IBM Corporation
Case study : Tier 1 North American bank
Business application targeted by sophisticated banking Trojan's (mostly Dyre)
•  Up to 100% detection - fraud losses are close to 0
•  <0.05% alerts per logins - reduced from ~200 alerts/day by legacy system to ~20
100% 98%
90%
97%
100% 99% 100%
97%
100% 99% 100% 100% 99%
0%
50%
100%
Nov-2014 Dec-2014 Jan-2015 Feb-2015 Mar-2015 Apr-2015 May-2015 Aug-2015 Sep-2015 Oct-2015 Nov-2015 Dec-2015 Jan-2016
Detection
Rate
Alert Rate < 0.05%
Within days:
•  Live Policy update set
to protect against new
threat
•  No impact on alert rate
Corporate app
targeted by new
Dyre Campaign
18© 2016 IBM Corporation
Pinpoint detect – tier options
tiered detection options
USERS
ATTACKSDEFENSES
App
server
Trusteer
attack
research
Trusteer
defense
research
standard
premium
•  Pinpoint detect standard Trusteer threat network access and dynamic updates
•  Pinpoint detect premium high-touch threat research service, expediting attack analysis & optimizing defense
at the application level granularity
App
server
tailored threat research
threat intelligence network
19© 2016 IBM Corporation
Pinpoint detect - simplified integration
standardized, unified
USERS
ATTACKSDEFENSES
standardized, unified
•  Fastest time-to-value, minimum integration effort -
now with smart standard snippet & unified interfaces
across all server-side solutions
•  Single page application support
•  Seamless upgrade enabled by detaching snippet-
engine backend
GUI
APIs
feeds
Snippets
app /
server
20© 2016 IBM Corporation
Trusteer Fraud Protection Suite
digital fraud protection & Fraud lifecycle management
all-inclusive real-time fraud detection solution, tier options
extendable to a complete lifecycle management solution
unique remediation solution for infected end points
USERS
ATTACKSDEFENSES
app /
server
Protection
&
lifecycle
Detect real-time digital channel fraud
Remediate compromised end-points
•  Pinpoint detect standard / premium
•  Rapport for Remediation
Enforce access & manage authentication
•  IBM Security Access Manager (ISAM)
Investigate case & alert management
•  IBM Counter Fraud Management (CFM)
21© 2016 IBM Corporation
Notices and Disclaimers
2
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission
from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of
initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS
DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE
USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM
products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers
have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in
which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and
discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or
their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and
interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such
laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
22© 2016 IBM Corporation
Notices and Disclaimers Con’t.
2
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not
tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®,
FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG,
Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®,
PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®,
StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business
Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any
damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other
IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being
altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can
be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF
ANY PARTY.
THANK YOUwww.ibm.com/security
1 de 23

Recomendados

IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso... por
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
1.9K visualizações37 slides
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment por
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
2.1K visualizações33 slides
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba... por
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
1.1K visualizações20 slides
Malware on Smartphones and Tablets: The Inconvenient Truth por
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
1.7K visualizações38 slides
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it por
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
745 visualizações25 slides
Recent ECB/ EBA regulations how they will impact European banks in 2016 por
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
2.6K visualizações23 slides

Mais conteúdo relacionado

Mais procurados

Uncover What's Inside the Mind of a Hacker por
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
1.3K visualizações34 slides
Tolly Report: Stopping Attacks You Can't See por
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
942 visualizações28 slides
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud... por
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
672 visualizações32 slides
Empowering Application Security Protection in the World of DevOps por
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
974 visualizações21 slides
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar por
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
4K visualizações25 slides
Valuing Data in the Age of Ransomware por
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
703 visualizações28 slides

Mais procurados(20)

Uncover What's Inside the Mind of a Hacker por IBM Security
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
IBM Security1.3K visualizações
Tolly Report: Stopping Attacks You Can't See por IBM Security
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
IBM Security942 visualizações
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud... por IBM Security
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
IBM Security672 visualizações
Empowering Application Security Protection in the World of DevOps por IBM Security
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
IBM Security974 visualizações
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar por IBM Security
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security4K visualizações
Valuing Data in the Age of Ransomware por IBM Security
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
What’s the State of Your Endpoint Security? por IBM Security
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
IBM Security2.4K visualizações
Compete To Win: Don’t Just Be Compliant – Be Secure! por IBM Security
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security1.1K visualizações
Security Trends in the Retail Industry por IBM Security
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
IBM Security3.1K visualizações
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom por IBM Security
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security2K visualizações
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016 por IBM Security
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security9.3K visualizações
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security675 visualizações
Level Up Your Security with Threat Intelligence por IBM Security
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
IBM Security1K visualizações
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data por IBM Security
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security1.7K visualizações
The 2016 Ponemon Cost of a Data Breach Study por IBM Security
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security5.1K visualizações
Top 12 Cybersecurity Predictions for 2017 por IBM Security
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security1.3K visualizações
IBM Security Services Overview por Casey Lucas
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas2.5K visualizações
Compliance is a pit stop – your destination lies ahead por IBM Security
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
IBM Security846 visualizações
Are Cloud Apps the Invisible Man? por IBM Security
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
IBM Security1.2K visualizações

Destaque

Some experiences from early-stage Australian startups por
Some experiences from early-stage Australian startupsSome experiences from early-stage Australian startups
Some experiences from early-stage Australian startupsDavid Jones
705 visualizações20 slides
Security and Authentication at a Low Cost por
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
961 visualizações57 slides
ThreatMetrix – Building Trust on the Internet por
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix
1.2K visualizações1 slide
Trusteer Rapport – Browser Security - How It Works por
Trusteer Rapport – Browser Security - How It WorksTrusteer Rapport – Browser Security - How It Works
Trusteer Rapport – Browser Security - How It Workstrusteer
10.3K visualizações21 slides
ThreatMetrix ARRC 2016 presentation by Ted Egan por
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
643 visualizações37 slides
Masters thesis - Fraud & Big Data por
Masters thesis - Fraud & Big DataMasters thesis - Fraud & Big Data
Masters thesis - Fraud & Big DataStephanie Canovas
2.4K visualizações41 slides

Destaque(19)

Some experiences from early-stage Australian startups por David Jones
Some experiences from early-stage Australian startupsSome experiences from early-stage Australian startups
Some experiences from early-stage Australian startups
David Jones705 visualizações
Security and Authentication at a Low Cost por Donald Malloy
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
Donald Malloy961 visualizações
ThreatMetrix – Building Trust on the Internet por ThreatMetrix
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the Internet
ThreatMetrix1.2K visualizações
Trusteer Rapport – Browser Security - How It Works por trusteer
Trusteer Rapport – Browser Security - How It WorksTrusteer Rapport – Browser Security - How It Works
Trusteer Rapport – Browser Security - How It Works
trusteer10.3K visualizações
ThreatMetrix ARRC 2016 presentation by Ted Egan por Ken Lam
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
Ken Lam643 visualizações
Masters thesis - Fraud & Big Data por Stephanie Canovas
Masters thesis - Fraud & Big DataMasters thesis - Fraud & Big Data
Masters thesis - Fraud & Big Data
Stephanie Canovas2.4K visualizações
Executive dinner performancemanagementv6.4.-nr por Andrea Corona
Executive dinner performancemanagementv6.4.-nrExecutive dinner performancemanagementv6.4.-nr
Executive dinner performancemanagementv6.4.-nr
Andrea Corona300 visualizações
18th Finance Tech Forum - IBS - IBM BBCI por Goran Angelov
18th Finance Tech Forum - IBS - IBM BBCI18th Finance Tech Forum - IBS - IBM BBCI
18th Finance Tech Forum - IBS - IBM BBCI
Goran Angelov610 visualizações
Rethinking the business of banking? por Brian Royle
Rethinking the business of banking?Rethinking the business of banking?
Rethinking the business of banking?
Brian Royle849 visualizações
Business Intelligence Presentation - Data Mining (2/2) por Bernardo Najlis
Business Intelligence Presentation - Data Mining (2/2)Business Intelligence Presentation - Data Mining (2/2)
Business Intelligence Presentation - Data Mining (2/2)
Bernardo Najlis2.7K visualizações
Cyber Security and the Impact on your Business por Lucy Denver
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver428 visualizações
Fnb optimizes retail banking product offers using real-time propensity models... por Avsharn
Fnb optimizes retail banking product offers using real-time propensity models...Fnb optimizes retail banking product offers using real-time propensity models...
Fnb optimizes retail banking product offers using real-time propensity models...
Avsharn826 visualizações
Combat the Latest Two-Factor Authentication Evasion Techniques por IBM Security
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
IBM Security1.5K visualizações
Fighting Frauds Using Big Data Visibility and Intelligence por Ajeet Singh
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and Intelligence
Ajeet Singh9.4K visualizações
Blockchain session @ 2nd Bluemix Meetup por Alberto Miyazaki
Blockchain session @  2nd Bluemix MeetupBlockchain session @  2nd Bluemix Meetup
Blockchain session @ 2nd Bluemix Meetup
Alberto Miyazaki663 visualizações
Banking in the age of the empowered consumer por IBM Analytics
Banking in the age of the empowered consumerBanking in the age of the empowered consumer
Banking in the age of the empowered consumer
IBM Analytics2.2K visualizações
IBM WebSphere Portal 6.1 Preview - What's New por Dvir Reznik
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's New
Dvir Reznik2.4K visualizações
IBM Blockchain Experience - Suwat - 20161027 por IBM Thailand Co Ltd
IBM Blockchain Experience - Suwat - 20161027IBM Blockchain Experience - Suwat - 20161027
IBM Blockchain Experience - Suwat - 20161027
IBM Thailand Co Ltd2K visualizações

Similar a The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite

3 Enablers of Successful Cyber Attacks and How to Thwart Them por
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
1.4K visualizações18 slides
Bordless Breaches and Migrating Malware por
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
229 visualizações20 slides
IBM - IAM Security and Trends por
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
1.8K visualizações17 slides
Mobile Payments: Protecting Apps and Data from Emerging Risks por
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
1.4K visualizações31 slides
Mitigate attacks with IBM BigFix and Q-Radar por
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarFrancisco González Jiménez
1.9K visualizações25 slides
Cyber threats por
Cyber threatsCyber threats
Cyber threatsSonia Baratas Alves
262 visualizações25 slides

Similar a The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite(20)

3 Enablers of Successful Cyber Attacks and How to Thwart Them por IBM Security
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security1.4K visualizações
Bordless Breaches and Migrating Malware por Sarah Freemantle
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
Sarah Freemantle229 visualizações
IBM - IAM Security and Trends por IBM Sverige
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige1.8K visualizações
Mobile Payments: Protecting Apps and Data from Emerging Risks por IBM Security
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security1.4K visualizações
Secure Identity: The Future is Now por Lane Billings
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
Lane Billings239 visualizações
Mobile Threat Management por Killian Delaney
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
Killian Delaney220 visualizações
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security por IBM Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM Security6.6K visualizações
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net por xband
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
xband327 visualizações
Pulse 2014.mobile first.security por Sreeni Pamidala
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
Sreeni Pamidala85 visualizações
IBM MaaS360 with watson por Prime Infoserv
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Prime Infoserv756 visualizações
Smarter cyber security v8 por John Palfreyman
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
John Palfreyman992 visualizações
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly por IBM Security
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM Security1.9K visualizações
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin... por IBM Security
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM Security1.9K visualizações
3 Steps to Security Intelligence - How to Build a More Secure Enterprise por IBM Security
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security3.8K visualizações
Ibm q radar_blind_references por Maarten Werff
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
Maarten Werff545 visualizações
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics por IBM Security
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security6.6K visualizações
Building a Next-Generation Security Operation Center Based on IBM QRadar and ... por IBM Security
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security20.9K visualizações

Mais de IBM Security

Automation: Embracing the Future of SecOps por
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K visualizações22 slides
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
914 visualizações39 slides
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
941 visualizações24 slides
Integrated Response with v32 of IBM Resilient por
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
1K visualizações21 slides
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 visualizações12 slides
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 visualizações18 slides

Mais de IBM Security(20)

Automation: Embracing the Future of SecOps por IBM Security
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security2K visualizações
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por IBM Security
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security914 visualizações
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por IBM Security
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security941 visualizações
Integrated Response with v32 of IBM Resilient por IBM Security
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security1K visualizações
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por IBM Security
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
IBM Security775 visualizações
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por IBM Security
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
IBM Security742 visualizações
Accelerating SOC Transformation with IBM Resilient and Carbon Black por IBM Security
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
IBM Security966 visualizações
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por IBM Security
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security1.3K visualizações
Are You Ready to Move Your IAM to the Cloud? por IBM Security
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security2K visualizações
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K visualizações
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K visualizações
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K visualizações
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K visualizações
WannaCry Ransomware Attack: What to Do Now por IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
How to Improve Threat Detection & Simplify Security Operations por IBM Security
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security1.9K visualizações
IBM QRadar UBA por IBM Security
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
Mobile Vision 2020 por IBM Security
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security1.5K visualizações
Retail Mobility, Productivity and Security por IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K visualizações
Close the Loop on Incident Response por IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
Orchestrate Your Security Defenses; Protect Against Insider Threats por IBM Security
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security1.2K visualizações

Último

How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... por
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...Vadym Kazulkin
75 visualizações64 slides
Attacking IoT Devices from a Web Perspective - Linux Day por
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 visualizações68 slides
Future of Learning - Yap Aye Wee.pdf por
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfNUS-ISS
41 visualizações11 slides
Java Platform Approach 1.0 - Picnic Meetup por
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic MeetupRick Ossendrijver
25 visualizações39 slides
Combining Orchestration and Choreography for a Clean Architecture por
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean ArchitectureThomasHeinrichs1
69 visualizações24 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
15 visualizações15 slides

Último(20)

How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... por Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 visualizações
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 visualizações
Future of Learning - Yap Aye Wee.pdf por NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS41 visualizações
Java Platform Approach 1.0 - Picnic Meetup por Rick Ossendrijver
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver25 visualizações
Combining Orchestration and Choreography for a Clean Architecture por ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.50 visualizações
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 visualizações
The Importance of Cybersecurity for Digital Transformation por NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 visualizações
Empathic Computing: Delivering the Potential of the Metaverse por Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 visualizações
How the World's Leading Independent Automotive Distributor is Reinventing Its... por NUS-ISS
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS15 visualizações
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica... por NUS-ISS
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS16 visualizações
The details of description: Techniques, tips, and tangents on alternative tex... por BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada121 visualizações
[2023] Putting the R! in R&D.pdf por Eleanor McHugh
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh38 visualizações
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 visualizações
Roadmap to Become Experts.pptx por dscwidyatamanew
Roadmap to Become Experts.pptxRoadmap to Become Experts.pptx
Roadmap to Become Experts.pptx
dscwidyatamanew11 visualizações
Web Dev - 1 PPT.pdf por gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 visualizações
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 visualizações
Perth MeetUp November 2023 por Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 visualizações

The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite

  • 1. © 2016 IBM Corporation Fighting digital banking fraud objectives & challenges
  • 2. 2© 2016 IBM Corporation So many ways to commit fraud and account takeover January 2015 Bank Fraud Toolkit Circumvents 2FA and Device Identification Use stolen credentials Phishing / Criminal Device Steal Personally Identifiable Information Steal Credentials Automated Transaction Man-in-the-Browser MalwarePharming - Redirect - Overlay Landing Page Login Page My Information Website Remote Control Tools Ride the session Transaction
  • 3. 3© 2016 IBM Corporation Anatomy of a Dyre Attack Fake Banking Website Banking WebsitePhishing Email 1 2 3 4 5 6 Navigation to online banking website Victim’s device gets infected with malware Credentials and PII are sent to criminal Dyre diverts user to fake website Money transfer to mule account Login to online banking
  • 4. 4© 2016 IBM Corporation Current fraud prevention solutions are failing !  Accuracy – high false positive alerts and actual fraud often missed !  Adaptability – cannot react to new threats and new attack methods !  Cost – maintenance / updates / modifications are very expensive !  Collaboration – data not shared between installed solutions !  Convenience – negative impact on customer Fraud operation costs Authentication challenges Transaction delays Account Suspensions Solution shortcomings… cause critical problems
  • 5. 5© 2016 IBM Corporation “Vision is the art of seeing what is invisible to others.” Jonathan Swift
  • 6. © 2016 IBM Corporation Trusteer Approach technology & intelligence
  • 7. 7© 2016 IBM Corporation Trusteer approach vs. traditional fraud controls Fraud detection that works for your business •  Unparalleled accuracy evidence-based detection, leveraging global threat intelligence network •  Built-in adaptability & agility always up-to-date, seamlessly adjusted to new-threat, fueled by innovative Big Data technologies and world-class threat experts •  Extreme operational scalability cloud-based operation, linearly grows with your business, processing in real-time virtually any number of sessions/day •  Seamless user experience online & mobile channels actionable real- time risk assessment •  Ease of integration simple, standardized across Trusteer solutions End-userexperience Fraud detection Pinpoint (cloud) one-time password static password biometrics risk-engine (statistical) Rapport (end-point) Trusteer protection controls Traditional protection controls Effectiveness trend over time ?
  • 8. 8© 2016 IBM Corporation Trusteer threat intelligence network the largest actionable fraud intelligence network worldwide USERS ATTACKSDEFENSES always up-to-date • push & pull • shared
  • 9. 9© 2016 IBM Corporation network feeders & brain dynamically fed, intelligence-driven USERS ATTACKSDEFENSES application Smart sensors Trusteer attack researchEnd-point Smart sensors 3rd party Intelligence suppliers Trusteer defense research customers’ own intelligence big data & analytics technologies 100s infections/day 100Ms sessions/day MOs, targets, accounts, fraudsters daily defense update pattern recognition
  • 10. 10© 2016 IBM Corporation Trusteer intelligence lifecycle volume & velocity USERS ATTACKSDEFENSES collect data • identify new threat • research attack • develop defense • protect all the time all over the world new threat-to-protect measured in hours
  • 11. 11© 2016 IBM Corporation Trusteer solutions - fighting digital fraud smart dynamic agents – collecting, detecting & protecting - across the access chain Mobile SDK & secure browser mobile application & device protection Rapport end-point protection UDERS ATTACKSDEFENSES Fraud protection suite digital fraud protection & lifecycle management Pinpoint malware detection snippet-based man-in-the-browser MW infection alert new! app / server end point threat intelligence network accesschain
  • 12. © 2016 IBM Corporation What’s new
  • 13. 13© 2016 IBM Corporation What’s New Pinpoint Detect Pinpoint Detect Remediate Pinpoint Criminal Detection Pinpoint Malware Detection Rapport for Mitigation Access Management (ISAM) Case Management (CFM) + lifecycle management solution unified detection 2 1 Trusteer Fraud Protection Suite
  • 14. 14© 2016 IBM Corporation IBM Security Trusteer Fraud Protection Suite Key benefits FRAUD PROTECTION SUITE new! next-gen dynamic accurate fraud detection compromised identities & unauthorized access threat-aware access management dynamic risk assessment feed & recommendation advanced case & event management streamline investigation and threat analysis powerful remediation tool easily protect infected end-points
  • 15. 15© 2016 IBM Corporation Pinpoint detect – digital fraud detection ultimate coverage & new threats agility USERS ATTACKSDEFENSES •  Remote Access Tool (RAT) •  Malware-driven account takeover •  Malware-driven man-in-the-browser / man-in-the-middle •  Phishing & pharming •  New variation MOs & defenses: Dridex, Zeus, Bugat, etc. •  … new threats defenses updated daily, at no extra charge
  • 16. 16© 2016 IBM Corporation Pinpoint detect – digital fraud detection unparalleled efficacy & accuracy for all types of digital fraud USERS ATTACKSDEFENSES user profile + attack specs + app-level defense current session data risk Unparalleled accuracy Pinpoint detect is so accurate because it is the only solution that has intelligence-based real-time risk assessment against attack & user profile application-aware defense policy direct & redirect channel cross-check - risk score - risk reason - device details (device ID) - account details (encrypted UID) - recommendation (allow/ authenticate/ allow & restrict) App server
  • 17. 17© 2016 IBM Corporation Case study : Tier 1 North American bank Business application targeted by sophisticated banking Trojan's (mostly Dyre) •  Up to 100% detection - fraud losses are close to 0 •  <0.05% alerts per logins - reduced from ~200 alerts/day by legacy system to ~20 100% 98% 90% 97% 100% 99% 100% 97% 100% 99% 100% 100% 99% 0% 50% 100% Nov-2014 Dec-2014 Jan-2015 Feb-2015 Mar-2015 Apr-2015 May-2015 Aug-2015 Sep-2015 Oct-2015 Nov-2015 Dec-2015 Jan-2016 Detection Rate Alert Rate < 0.05% Within days: •  Live Policy update set to protect against new threat •  No impact on alert rate Corporate app targeted by new Dyre Campaign
  • 18. 18© 2016 IBM Corporation Pinpoint detect – tier options tiered detection options USERS ATTACKSDEFENSES App server Trusteer attack research Trusteer defense research standard premium •  Pinpoint detect standard Trusteer threat network access and dynamic updates •  Pinpoint detect premium high-touch threat research service, expediting attack analysis & optimizing defense at the application level granularity App server tailored threat research threat intelligence network
  • 19. 19© 2016 IBM Corporation Pinpoint detect - simplified integration standardized, unified USERS ATTACKSDEFENSES standardized, unified •  Fastest time-to-value, minimum integration effort - now with smart standard snippet & unified interfaces across all server-side solutions •  Single page application support •  Seamless upgrade enabled by detaching snippet- engine backend GUI APIs feeds Snippets app / server
  • 20. 20© 2016 IBM Corporation Trusteer Fraud Protection Suite digital fraud protection & Fraud lifecycle management all-inclusive real-time fraud detection solution, tier options extendable to a complete lifecycle management solution unique remediation solution for infected end points USERS ATTACKSDEFENSES app / server Protection & lifecycle Detect real-time digital channel fraud Remediate compromised end-points •  Pinpoint detect standard / premium •  Rapport for Remediation Enforce access & manage authentication •  IBM Security Access Manager (ISAM) Investigate case & alert management •  IBM Counter Fraud Management (CFM)
  • 21. 21© 2016 IBM Corporation Notices and Disclaimers 2 Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
  • 22. 22© 2016 IBM Corporation Notices and Disclaimers Con’t. 2 Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 23. © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security