Anti-Fraud Suite Holistic Approach to Online Banking Security About - - PowerPoint PPT Presentation

anti fraud suite
SMART_READER_LITE
LIVE PREVIEW

Anti-Fraud Suite Holistic Approach to Online Banking Security About - - PowerPoint PPT Presentation

Anti-Fraud Suite Holistic Approach to Online Banking Security About ThreatMark 2 Made Ma de in Czec ech h Repu public Fo Foun unded ded in 2015 15 Active on 4 continents by former Ethical Hackers 50 50+ Exper erts s 20+ million


slide-1
SLIDE 1

Anti-Fraud Suite

Holistic Approach to Online Banking Security

slide-2
SLIDE 2

2

About ThreatMark

Fo Foun unded ded in 2015 15

by former Ethical Hackers

20+ million n

clients protected

High gh-tec ech h Securit urity Compan any

strong focus on behavioral biometrics and AI/ML

No Notab able e Achi hievem ements

Most deployed online banking fraud prevention in Czech and Slovak republic Selected over IBM, RSA, F5 and other competing solutions by large international banking groups Protecting more mobile end-point devices than any other leading A/V company in CEE

50 50+ Exper erts s

focused on one product

Ma Made de in Czec ech h Repu public

Active on 4 continents

slide-3
SLIDE 3

3

Online Banking Fraud Mobile Banking Fraud User Identity Verification Cyber Threats Protection Endpoint Protection Risk-Based Strong Customer Authentication PSD2 Compliance Dynamic Application Self-Protection And More…

Customers Benefit from Our Innovation

slide-4
SLIDE 4

4

Trusted by the World‘s Leading Banks

Award-Winning Technology

slide-5
SLIDE 5

Anti-Fraud Suite

Bringing Trust to the Digital World

slide-6
SLIDE 6

6

Digital Identity Verification

ROBOTIC ACCESS TOR BROWSER REMOTE ACCESS OPERATION SYSTEM MALWARE BEHAVIOUR BIOMETRICS NETWORK WEB BROWSER DEVICE FINGERPRINT DATE & TIME WEB-INJECT TRANSACTIONS GLOBAL INTELLIGENCE AI/ML GEOLOCATION

slide-7
SLIDE 7

7

Complete Suite For Online Banking Protection

AFS Payments

  • Machine-Learning based Risk Scoring of payment transactions
  • Global intelligence, human feedback, Business-driven Rule Engine
  • Managed service model

#PSD2 TRA, #TRM, #TRA, #Payment Fraud Prevention

AFS Threats

  • Banking Specific Cyberthreat protection for online channels
  • Security Operation Center 24/7,
  • Phishing Takedown Service, Fraud & Malware Analyst Service

#Banking Malware, #Phishing, #BOTs, #Scraping (PSD2 RTS), #Application protection, #Device profiling, #0-Day Malware, #Threat Intelligence

AFS Identity

  • Solution for gathering and analysing user‘s behavioral biometrics data

#Adaptive Authentication, #Risk-Based Authentication, #PSD2 SCA, Improving UX

slide-8
SLIDE 8

8

ThreatMark‘s Trusted Identity

AFS Threats AFS Identity AFS Payments

Phishing

Webpage Cloning Detection Phishing Site Usage Detection Phished Users Detection

Malware

Webinjects Active RAT Detection Malicious Applications Detections Overlay Detection SMS Hijacking Detection

BOTs

Webscraping (Screenscraping) API Scraping Application Debugging Application Cloning Emulator Detection Device Security Profiling

Behavior

Date/Time behavior Device Usage and Interaction Navigation Behavior Behavioral Biometrics Application Interaction Behavior Transaction / Login behavior Payment Anomalies / Behavior Payment Rules and Alerts Mule/Fraudster Accounts Shared Fraud Schemes Advanced Device Identification IP reputation Network Fraudulent Accounts/Identities Shared Identities/Devices

Identity

Shared Intelligence and Orchestration

Suspicious Sequence Fraudsters IP Reputation Case Management Known Fraudulent Actions Web/Mobile/OpenAPI Payments Omnichannel Geo fencing Cross-channel fraud detection PSD2 Authorization Schemes

ThreatMark Trusted Identity

Payments Actions Channels Behavior Identity Phishing Malware BOTs App./Device hacking

slide-9
SLIDE 9

9

DATA ANALYTICS

L A Y E R 5

Big Data AI/ML Continuous User profiling Human Feedback re-learning Business Rules

TRANSACTION

L A Y E R 4

Money mule blacklist Abnormal spending behaviour Transaction Integrity

NAVIGATION

L A Y E R 3

Clickstream profiling Scripted access and automation detection Session hijacking Behaviour and app interaction biometrics

Layered Security Approach and Orchestration

LOGON

L A Y E R 2

GeoIP check Login time check Login biometrics Velocity checks Action context

ACCESS

L A Y E R 1

Connection check (TOR, anon-proxy) Browser and OS security check Malware, phishing Device fingerprint

slide-10
SLIDE 10

10

PSD2

PSD2 - Compliance

SCA

Screen een Scrap aping ng

  • Prohibited
  • Detectable

Trans nsac action

  • n Risk Anal

alysi sis

  • Abnormal spending behavioural patterns
  • Location of payer
  • Location of payee’s account
  • Known fraud scenarios
  • Unusual information about the device or

software

  • Signs of malware infection

Strong

  • ng Custom
  • mer

er Auth then enti ticati tion

  • n
  • Possession
  • Knowledge
  • Inherence – Behavioural biometry

Trans nsac action

  • n Mo

Monitor

  • ring

ng

  • Real-time scoring
  • Authentication element stolen
  • Detection of Financial Malware
  • Known fraudulent scenarios
  • Amount of each payment
slide-11
SLIDE 11

11

AFS ONLINE WEB PROBE

Implement JavaScript probe in form of simple “one liner” into protected Web Page.

Easy Deployment in 7 Days

AFS ENDPOINT MOBILE PROBE

Implement TM SDK library into your Native Mobile Application if needed

SETUP CONNECTION

Allow connection to AFS ANALYTICS infrastructure.

AFS ANALYTICS

Setup AFS ANALYTICS infrastructure. Optional: AFS can be deployed in your infrastructure.

INTEGRATE

Optional: Use API for full integration with any internal and/or 3rd party system.

[ ] [ ]

slide-12
SLIDE 12

12

Architecture

Web server AFS Analytic Servers Internet Banking Bank’s DMZ

JS Probe & SDK data

  • App. Server

Existing FDS

Core Banking/Authentication

SOC

TM SDK

Mobile Banking

JS Probe

Firewall ThreatMark’s Cloud User Fraud Analyst AFS Panel

slide-13
SLIDE 13

13

Competitive Landscape

ThreatMark AFS Market Leaders in Fraud Analytics (SAS, NICE, Feed edzai) Typical Inhouse developed FDS (vari rious na names) Leaders in Threat Detection Solutions (IBM Trusteer, , RSA, F5 F5)

Areas Covered

Transaction analysis, Threats, Session anomalies, User Identification

Transaction analysis only Transaction analysis only Threats, Session anomalies only

Shared intelligence Rich Analytical Interface Gartner Layers covered

All 5 layers 3rd to 5th 1st limited 3rd - static rules 1st and 2nd

Machine Learning based

Limited to threats

Security Operations Center

Threat Intelligence and Fraud Analysts Threat Intelligence only

Setup and Operational Costs

Very Low Very High Low Medium

slide-14
SLIDE 14

14

Benefits for the End-users

Improved security increases TRUST Less fraud and lower fraud losses Better User Experience

 removes friction from authentication and authorization  removes friction from transaction voice authorization

slide-15
SLIDE 15

15

Business Benefits

Improved security and visibility brings TRUST Less fraud and lower fraud losses 90% lower costs for Authentication and Authorization Fewer manual reviews means lower costs 5x faster time to delivery and

  • perational costs
slide-16
SLIDE 16

16

Summary

  • Holistic online banking fraud prevention that combines:
  • banking threats detection,
  • seamless user identity verification and
  • ML based transaction risk analysis under one

analytics

  • Behavioral Biometry based detection of identity and user

intentions

  • Shared fraud intelligence never seen in banking FDS

before

  • Machine learning with Human feedback
  • Under 7-days long deployment with no API integration

necessary

  • Fully managed on-premise and cloud deployments
  • 24/7 Security Operations Center with remote fraud analyst

and security experts constantly analyzing threats and assisting customers

  • Pre-integrated with Authentication providers, Omnichannel

banking providers, White-labeled

Technol

  • log
  • gy

Deliver ery y & Oper Operation

  • ns
slide-17
SLIDE 17

www.threatmark.com

Protect your business.Now!

Michal Tresner

CEO

michal.tresner@threatmark.com