Professional Documents
Culture Documents
Issue 1
2
13
2
Approaching Fraud Differently, an Introduction from
Christopher Bailey, CTO NuData Security Inc.
On behalf of NuData Security, I am pleased to be able to offer you a
complimentary copy of the 2014 Market Guide for Online Fraud Detection,
which outlines a five layer model of fraud detection capabilities. This is
exciting for me personally, for reasons that will soon become clear.
Our approach to
continuous behavioral
monitoring is why the
largest companies in
the world trust NuData
Security for online fraud
detection.
Christopher Bailey, CTO
Christopher Bailey
Many fraud detection solutions reflect the structure of large siloed companies: excellent capabilities in
one layer, but with a critical inability to communicate effectively with other layers. This is where our
approach is different. NuDetect operates as a tightly integrated model because when you allow layers to
communicate with each other you discover emergent patterns that are impossible to detect otherwise.
Within the first week,
NuDetect discovered
an exploit that had
already cost us
over $100,000
An International Goods Firm
3
Putting Gartners Recommendations into Practice
Below is an overview of why you should implement
Gartners key recommendations with NuDetect, and
prevent your company from being a victim of Online
Fraud.
We rely on NuData
to protect us from
fraudulent activity
but we see as much
value from the trust
NuDetect establishes
between us and our user
community
A Global Technology Company
4
From the Gartner Files:
5
Suspending the transaction if actual behavior is
out of range with whats expected
Conducting further review and investigation of
the transaction, as warranted
Triggering automated user authentication
and transaction verification functions that
interact with the user in order to determine the
legitimacy of the user or transaction
OFD applies mainly to three use cases:
Detecting account takeover, which can occur
when user account credentials are stolen
or authenticated sessions are hijacked (for
example, via malware-based attacks)
Market Direction
This OFD Market Guide replaces Gartners Magic
Quadrant for Web Fraud Detection, reflecting
the fragmentation, consolidation and expansion
of the OFD market. These market dynamics were
witnessed during several mergers and acquisitions
in 2012 and 2013, while, at the same time, many
new entrants emerged from different corners of the
market.
For example, in 2012, RSA, The Security Division
of EMC, acquired Silver Tail Systems and Diebold
acquired Gas Tecnologia. In 2013, Experian
acquired 41st Parameter, F5 acquired Versafe, IBM
acquired Trusteer and NCR bought Alaric Systems.
(All acquisition targets except Versafe a relative
newcomer were covered in Gartners Web Fraud
Detection Magic Quadrants.)
At the same time as the market was consolidating,
user requirements in an increasingly complex
online world under cyberattack have driven
innovation in separate (but related) fraud detection
capabilities, which are needed to stay ahead of
evolving criminal methods.1 Over time, these
disparate capabilities and the vendors that support
them will come together in a consolidated market
6
Banking: This also includes payments between
all parties that accept, transmit or process
payments.
Most organizations
cannot keep up with the
latest attack vectors
Gartner, Market Guide for
Online Fraud Detection,
2 June 2014.
Continually monitor
and analyze user
behavior, as soon as
a relationship with an
individual begins until
it ends, because the life
circumstances of the
individual may change,
or the identity may have
been bad to start with
Gartner, Identity Proofing
Revisited as Data
Confidentiality Dies,
Avivah Litan,
12 December 2013.
7
Mobile-centric and multiple aspects for fraud
detection: Mobile commerce has presented
significant effectiveness and usability
challenges to existing ways of identifying end
users and their devices, which worked relatively
well on desktop and laptop computers. As such,
enterprises are looking for fraud detection
solutions that do not inconvenience mobile
users, but do ensure that applications are
accessed only by legitimate, authorized users.
(For example, device fingerprinting is ineffective
on most mobile devices, while it considerably
helps to detect fraud originating from desktops
and laptops; however, it is becoming less
effective at detecting access via proxy servers.)
Mobile-centric fraud detection looks for signs of
fraud at the device, application and user level.
Smarter risk scoring models selfadjusting and self-learning:
Self-adjusting models: These reduce the
burden on users to help keep vendor risk
scoring models up to date by informing
the model on confirmed fraud events. Such
user participation has often been difficult to
maintain, so vendor models often get out of
date and, therefore, are unable to recognize
new fraud trends. Self-adjusting models
are enabled by baselining online activity
and looking for anomalies relative to the
baseline, with the assumption that most
online activity is good or legitimate.
Self-learning models: Ultimately, users
want to be able to throw their data into a
modeling system that can find fraud patterns
they have never even considered. In other
words, users want an application that can
figure out which activities are suspect or
fraudulent without them or the vendor
having to tell the application anything.
Some people refer to this as artificial
intelligence, which is starting to appear in
the OFD market.
Passive biometric analysis: Here, biometric
analysis is done behind the scenes and is
transparent or unknown to the user (unless
an organization chooses to tell the user it
is occurring). There is no user enrollment
necessary. Over time, the system is trained
on a users biometric signature so that it
can compare the signature to a fraudsters
on a blacklist, or to ongoing user behavior
to determine whether the legitimate user is
Passive biometric
analysis: here biometric
analysis is done behind
the scenes and is
transparent or unknown
to the user
Gartner, Market Guide for
Online Fraud Detection,
2 June 2014.
8
Fox-IT
GBGroup
Guardian Analytics
IBM (Trusteer)
IDology
InAuth
Banking
Accertify
ACI Worldwide
E-Commerce
Agnitio
Ayasdi
BioCatch
Contact Solutions
Inform
CustomerXPs
x
x
CyberSource
Intellinx
iovation
Kaspersky Lab
Kount
LifeLock (ID Analytics)
mSignia
NCR (Alaric Systems)
Nice Actimize
NuData Security
Plus-TI
ReD
Riskified
RSA, The Security Division
of EMC
SAS
Sift Science
Signifyd
Socure
ThreatMetrix
Trustev
Verint Systems (Victrio)
Digital Resolve
Easy Solutions
F5 (Versafe)
Feedzai
Fox-IT
GBGroup
Guardian Analytics
IBM (Trusteer)
IDology
InAuth
Inform
Intellinx
iovation
Kaspersky Lab
Pindrop Security
Sector-Neutral
x
x
Kount
mSignia
Nice Actimize
NuData Security
Pindrop Security
Plus-TI
ReD
Riskified
x
x
RSA
SAS
Sift Science
Signifyd
Socure
ThreatMetrix
Trustev
9
Table 2. Functional Capabilities and Focus
Accertify
ACI Worldwide
x
x
Ayasdi
BioCatch
CA Technologies
(Arcot Systems)
x
x
Contact Solutions
CustomerXPs
CyberSource
Digital Resolve
Easy Solutions
Experian (41st
Parameter)
F5 (Versafe)
x
x
x
x
Feedzai
x
x
GBGroup
Guardian Analytics
IBM (Trusteer)
IDology
InAuth
Inform
Intellinx
iovation
Kaspersky Lab
Kount
x
x
mSignia
Nice Actimize
NuData Security
x
x
x
x
Pindrop Security
Plus-TI
ReD
Riskified
RSA
x
x
SAS
Sift Science
Managed Fraud
Detection Svc.
x
Agnitio
Fox-IT
Self-Learning
Models
Gestures
Passive
Biometric
Analysis
Voice
Voice Response
Units
Call Center
External Threat
Intelligence
Telephony
Channel
Public (PII)
Information
Social Networks
Non-PII
Networks
Mobile Platform
Multiaspect
User/AccountCentric (Layer 3)
EndpointCentric (Layer 1)
Multiple Layers
(1-3)
Identity
Proofing
x
x
Signifyd
Socure
ThreatMetrix
Trustev
Verint Systems
(Victrio)
Source: Gartner (June 2014)
x
x
x
x
x
x
10
Market Recommendations
Evidence
Fraud managers:
Note 1
Give priority to vendors that provide multiple
layers of protection, user and/or account
profiling, and behavioral analytics using
statistical models and rules.
Give extra weighting and consideration to
vendors that bring actionable external identity
or threat intelligence to the OFD application.
If you already have a strong installed base of
fraud detection software, then consider using
just the external intelligence data from other
OFD vendors to strengthen your existing
fraud detection systems.
Recognize that resolving difficult challenges
and stopping advancing attacks in the
online channel will require piecing together
niche solutions. Most of the innovation that
addresses rapidly evolving criminal techniques
is introduced by small niche vendors, not the
ones that offer one-stop platforms.
This will only be a practical option if your
enterprise has considerable resources to
devote to this exercise, and already has a
significant installed base of fraud detection
software and services.
Integrate disparate point solutions into a
common alert management system wherein
alerts and their attributes can be weighted and
correlated to highlight the most suspect alerts
and events that need immediate attention.
Otherwise, you will have too many alert
management systems to manage, and your
organization will not benefit from correlating
the different events that are alerted.
Feed fraud data into a big data warehouse to
get an enterprise view of fraud and security
issues, and to support Layer 5 fraud detection.
11
transaction verification affords stronger security
and a higher level of assurance than in-band
processes do. The technologies in this layer
typically can be deployed faster than those in
subsequent layers, and go a long way toward
defeating malware-based attacks.
Layer 2 is navigation-centric; it monitors and
analyzes session navigation behavior and
compares it with navigation patterns that are
expected on that given site, or uses rules that
identify abnormal and suspect navigation
patterns. Its useful for spotting individual
suspect transactions, as well as fraud rings.
Generally, this layer can also be deployed faster
than Layers 3, 4 and 5, and it can be effective in
identifying and defeating malware-based attacks.
12
About NuData Security:
NuData Security uses behavioral analysis to
prevent fraud online, protecting businesses
from brand damage and financial loss caused by
fraudulent or malicious attacks.
NuData Security monitors behavior
continuously; across every page, and every
visit. Fraud is a chain of events, so, by analyzing
every visit NuDetect sees the beginnings
of fraud the moment it starts - before the
transaction.
Businesses achieve improved customer trust
by keeping their online brand safe. Reduced
costs are realized by lowering reliance on
expensive and inefficient security controls
such as manual reviews and remediation. The
NuDetect platform also allows firms to accept
more transactions, with a greater confidence
that they will not result in fraud. Operating
passively, there is no impact to the user
experience.
Head office:
999 Canada Place - Suite 550,
Vancouver, British Columbia,
V6C 3T4 Canada
Phone: +1 (604) 800-3711
Email: bizdev@nudatasecurity.com
Website: www.nudatasecurity.com
LinkedIn: www.linkedin.com/company/nudata-security
Online Fraud Detection, A Layered Approach is published by NuData Security. Editorial content supplied by NuData Security is independent of Gartner analysis. All Gartner
research is used with Gartners permission, and was originally published as part of Gartners syndicated research service available to all entitled Gartner clients. 2014 Gartner,
Inc. and/or its affiliates. All rights reserved. The use of Gartner research in this publication does not indicate Gartners endorsement of NuData Securitys products and/or
strategies. Reproduction or distribution of this publication in any form without Gartners prior written permission is forbidden. The information contained herein has been obtained
from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. The opinions expressed herein are subject
to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not
be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research.
Gartners Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or
influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and
Objectivity on its website, http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp.