The BioCatch Case Manager tool empowers fraud operators to investigate high-risk activities and provide genuine and fraud feedback in real-time, reducing the fraud-review operational cost and enhancing accuracy of the risk engine based on confirmed fraud cases. The Case Manager tool helps simplify investigation and drives faster resolution, while providing visibility into the fraud operators activities and workload
BioCatch takes a unique approach to solve the Trojan predicament. Rather than detecting a specific Trojan variant, wouldn’t it be better to detect all types of malicious actors, be it Trojans, bots or other adversaries? And what if we could not only protect against current, known, threats, but also future, unknown modes of operation? And finally, what if this detection can be truly continuous, easy to integrate with and deploy, with tools that provide visibility into the user activity?
The Policy Manager allows fraud teams to define the actions that should take place depending on the various system outputs, streamlining the implementation process and heightening the usability of the BioCatch system. Going beyond simply providing a best-of-breed risk score, the BioCatch Policy Manager offers flexibility in establishing the actions that should occur if the user behavior inside a session triggers a predefined condition. Instead of building rules based on 0-1000 ranges that have to be well-understood for a particular environment, the Policy Manager allows fraud analysts to benefit from added logic that mitigates fraud in real-time, simplifies back-end operations and assists with gathering data for proactive, investigative analysis.
According to a recent UK Finance report, British banking customers lost £500m to fraudulent schemes in the first half of 2018 alone, the majority of which came from “unauthorised fraud” (i.e., hacking of user accounts.) During these six months, there were 3,866 confirmed cases of social engineering scams (“authorised fraud” or “impersonation”) in the UK, with the scams leading to £36.6M in losses, for an average loss in excess of £9,000 per person.
The problem is most acute in the UK but is not limited to that country. These types of scams are on the rise everywhere. The European Commission has revealed that it is looking into ways to address this vexing challenge. In the U.S., the Federal Trade Commission has reported that 77% of its fraud complaints involve contacts by telephone, of which voice social engineering is a subset. Most recently, the Australian Taxation Office has issued a warning on the rise of this threat.
The BioCatch Analyst Station is a web-based interface that displays the data for one or many sessions and provides summary reports. The portal enables the customer to easily detect and act upon possible fraudulent activity in user accounts. The BioCatch Analyst Station is used for post-session data analysis, typically at the end of each day or whenever required by the administrator.
Payroll systems are the life line of any company or organization. Typically, these systems assemble critical financial functions such as salaries, tax deductions, benefits, business-to-business payments, supplier bills and tax returns.
In recent years, Peer to Peer payments have shown a significant increase, passing the $120 billion mark (2017). Currently, one in three American consumers uses P2P apps to make instant payments to friends, relatives, service providers, or anyone they owe money. Since P2P account opening does not require identity verification, it is vulnerable to various types of fraud and threats including malware, social engineering, remote access, SIM swapping, call forwarding and other techniques. Using these techniques, the fraudsters are able to exploit two main points of failure:
Behavioral Biometrics analyzes a user’s physical and cognitive digital behavior to distinguish between genuine users and criminals in order to detect fraud and identity theft. Fraudsters input data differently from genuine users - they usually don’t have the same level of familiarity with the data, so they are more likely to have to repeatedly delete and fix errors or use automated programs for data input. Criminals will usually have more familiarity with the new account application form than a genuine user, since they are using it for multiple applications. This expertise will present itself with pace and navigation patterns of interaction that are different from those of a genuine user.