Components of Cyber Fraud & Risk Management Layer 5
1. Data Capture & Collection
- Network sniffing: transactions, screens, intra-application messages, database access
- Log files and databases
- Reference Data
2. Forensic Visual Audit Trail
- Replay user activity screen by screen “Google like” search on captured data, e.g. Who accessed a specific customer account in a specific time-frame?
- Captured data is encrypted and digitally signed - potentially admissible in court when needed
3. Fraud Analytics
- Dynamic Profiling and scoring of various entities
- Customizable business rules
- Real-time alerts
- New rules may be applied after-the-fact
4. Investigation Workbench & Case Management
- Manage Cases, Alerts and Incidents
- Flexible Reporting
- Control parameters of rules, profiles and scoring
For further information email: [email protected]
No comments:
Post a Comment