clear confident action april 2017 company confidential
play

Clear. Confident. Action April 2017 Company Confidential This - PowerPoint PPT Presentation

www.thetaray.com UNCOVER THE UNKNOWN Clear. Confident. Action April 2017 Company Confidential This presentation and the information herein, are the exclusive properties of Thetaray Ltd., and shall not be disclosed, in whole or in part, to any


  1. www.thetaray.com UNCOVER THE UNKNOWN Clear. Confident. Action April 2017 Company Confidential This presentation and the information herein, are the exclusive properties of Thetaray Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Thetaray Ltd. Ltd may update, amend, supplement or otherwise alter the information without prior notice Proprietary & Confidential

  2. 2 Proprietary & Confidential

  3. The Threat Environment Different Motivations, Billions Of Devices, Multiple Risks, The Threats Are Everywhere, Infinite Data Sources Unexpected Unauthorized Cyber Fraud Failures Access Criminals Cloud & Social Virtual Networks Engineering Computer Web & Mobile Networks Access Perimeter and Rule-based Security Has Failed! 6 Proprietary & Confidential

  4. Financial Threat Landscape $630M money laundering More than fine imposed by 1,000,000 The New York State incidents of financial fraud financial regulator & Every UK’s Financial conduct occurred in the first six 15 Sec. months of 2016 authority on Deutsche Bank ATM attackers in NY steal $45M Commerzbank fined $ 1.45B for failure to detect and report suspicious transactions Hackers Hit Bangladesh central bank using SWIFT network stealing $81M 4 Proprietary & Confidential

  5. Industry Trends DATA CREATION HAS EXPLODED - 90% of data in the world has been created in the past 2 year TERABYTES OF DATA COLLECTED BY ORGANIZATIONS UTILITIES GENERATE MORE DATA THAN EVER BEFORE The US Library of congress = 160 TB of Web Data ½ Terabytes 1 Year = 2 = 6 = 393 Generated Per Day 20 = Filled Library of congress > 100,000 Machines 18 16 Emitting data 14 12 20 10 8 CHEVRON’S DATA OCEAN IS GROWING: 6 4 2 TB/Day 1 5 2 0 Largest Bank India Boeing 787 NY Stock Exchange Data Per Day Per 30 min flight Per Day 1997 there were 5 TB in the entire company http://www.cisco.com/web/HR/ciscoconnect/2014/pdfs http://www.intelligentenergyevent.com/__novadocuments/48544?v=635304122638270000 http://isites.harvard.edu/fs/docs/icb.topic1346257.files/Big%20Data%20Powering%20the%20Next%20Industrial%20Revolution.pdf http://www.ge.com/docs/chapters/Industrial_Internet.pdf 5 Proprietary & Confidential

  6. Traditional Methods Are Limited RULE LE BASED DE DETECT CTION • Require predefined parameters/patterns • Based on prior knowledge of risk/threat FUNCT CTIONAL LIM LIMITATIONS • High rate of false positives • Limited set of parameters • Provides a partial perspective Conventional rule-based solutions cannot detect unknown risks 6 Proprietary & Confidential

  7. ThetaRay Advanced Analytics Platform Financial Data Business Transactions Machine Multi-Domain Anomaly Detection Data Data Engine Event Monitoring Hyper-Dimensional, Multi- Domain, Big Data Analytics™ Network Traffic & Logs 7 Proprietary & Confidential

  8. Consumer Lending (Mortgages) KEY FIN INDINGS 12 12 Hig igh - Risk Risk App pplic icatio ion • Large European Bank • Total loan value > 9M Euro CUSTOMER CU • Mortgage department Risk Management • Suspected internal fraud & Operations • " Borderline” approvals Non on-Risk Even ents • Detect unknown valuable events • Abnormal business processes • Higher level of assurance compared to the • Operational compliance existing control framework • Data Integrity CHALLENGE CH • Fast time to value Spee peed to o Valu alue • Increase efficiency & reduce cost of credit risk processes • 1 week prep • 2 weeks on-site Reso esources • 30,000 approved mortgage applications • • Data expert Customer, demographic, income etc. RESULTS • • Fraud analyst Property information • IT support • Product 8 8 Proprietary & Confidential

  9. ATM Security KEY FIN INDINGS “High - Impact” Secu ecurity Even ent • Global Top10 US Bank, CUSTOMER CU • Information Security department Including 71 similar anomalies (internal transfers, bunch deposits) • Anomaly transaction amount - from $1M to $4.3M (total > $100M) • 2,520 ATM machines (North America) Sus uspected Fraud • ATM transactions and logs DATA /Abn bnormal Cus ustomer • Beneficiaries and Accounts tables Activ ctivit ity • Multiple fixed-Interval Withdrawals – 63 withdrawals of • On boarding Duration: 9 days 50$ in 45 min session • 12 unknown events including suspected fraud, • RESULTS Multi-card session – multiple cards abnormal activity and operational deficiencies (chip, magnetic) used in same • session Transforming weeks of investigation to hours with pin-point forensic information • Rules creation/enhancement based on the detected patterns 9 Proprietary & Confidential

  10. ThetaRay Core Infrastructure COLLECTION ANALYSIS APPLICATIONS • • Math/analytics core • Forensic investigation Data handling • • Detection Algorithms • UI, reporting, management Storage Analytics Platform VERTICALS Industrial Internet of Things Financial Institutions 10 Proprietary & Confidential

  11. Intuitive & Innovative User Interface • Results Dashboard for accumulated results • Configuration center for quick setup • Forensics and extensive drill down capabilities • Dynamic ,flexible workflow • Graphic, Innovative & rich display 18 Proprietary & Confidential

  12. Unique Differentiators Unmatched Industry-low Rule-free, unsupervised, detection rates false positive rates non-heuristic 101101 010100 110110 Math based Automatic, Fast time to value big-data analytics real-time detection days vs. months ThetaRay helps financial organizations to boost operational risk detection and visibility across multiple departments and use cases 12 Proprietary & Confidential

  13. We Realize Everything Has Changed 13 Proprietary & Confidential

  14. Infinite Threats, Infinite Opportunities Proprietary & Confidential

  15. Summary A REAL NEED • Minimize exposure and impact • Rule-based systems are not enough • Almost unlimited target market INNOVATIVE TECHNOLOGY • Automatic, rule-free detection • High detection rates, low false alarms • Detect “ Unknown-Unknowns ” TIER 1 FINANCIAL INSTITUTIONS EXPERIENCED TEAM GREAT PARTNERSHIPS 15 Proprietary & Confidential

  16. Proprietary & Confidential

  17. This presentation brought to you by ThetaRay Ltd Proprietary & Confidential

  18. Contact Information Mar ark Gaz azit it Chief Executive Officer +972547777577 mark.gazit@thetaray.com www.thetaray.com +1(202)5690729 Proprietary & Confidential

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend