Transactional Point of Compromise Analysis
Cybercriminals are increasingly using personally identifiable information stolen elsewhere to open up new accounts dedicated exclusively to fraud. Establish the real identity of new users without inconveniencing genuine customers by employing Easy Solutions’ multi-layered platform for stopping fraudulent account registration. Gain visibility into the devices and credentials being used to create new accounts and proactively identify behavioral patterns common when fraud is about to take place so that you can protect customer money and data and mitigate risk.
 
Highlights:
 
˃ Suspicious activity analyzers that detect observed patterns linked to new account fraud
˃ Receive alerts when new account behavior deviates from normal customer activity
˃ Customize rules and alerts according to your organization’s fraud environment
˃ Comprehensive and integrated case management and reporting
˃ Detect devices that have previously committed or attempted new account fraud
˃ Monitor when stolen credentials are available for sale on black markets

s
New Account Fraud Features
Suspicious Activity Analyzers Identify Common Fraud Patterns
Suspicious Activity Analyzers Identify Common Fraud Patterns
Accounts being opened and used by fraudsters or mules exhibit behavior that is not typical of the majority of a company’s normal customer base; often, they are not used immediately and are saved for use in the future to bypass traditional fraud prevention rules. DetectTA, Easy Solutions’ risk monitoring solution, is able to analyze and generate alerts for new account creation activity commonly seen when those accounts turn out to be created for criminal purposes.
Behavior-Based Fraud Detection
Behavior-Based Fraud Detection
Go beyond static rules and start finding fraud based on behavioral analytics. Every transaction evaluated by DetectTA is associated with how it fits into an account’s regular activity, which the solution’s heuristic engine then uses to instantly qualify the transaction’s risk. Proactive alerts about high-risk behavior let you stop fraud before money can be stolen from other accounts.
Customizable Rules Tailored to Your Threat Landscape
Customizable Rules Tailored to Your Threat Landscape
Gain the ability to enforce anti-fraud actions based on your organization’s needs. Apply DetectTA’s rules to strictly curb any activities you want to prevent at both the institutional and specific account level. Use filters to keep the heuristic engine clean and limit false positives or unnecessarily triggered alerts.
Integrated Case Management and Reporting
Integrated Case Management and Reporting
DetectTA allows you to centralize the new account fraud investigation process from within the solution. View and modify information about potential incidents and classify and assign cases with no additional external management system required. Full and customized reporting can also be generated within DetectTA.
Spot Devices That Have Already Been Used In Attacks
Spot Devices That Have Already Been Used In Attacks
DetectID, Easy Solutions’ next-generation multi-factor authentication platform, generates a hardware-based, cookie-free device fingerprint that creates a persistent device ID to uniquely identify computers or mobile devices. This lets the solution flag devices that have previously been used for new account fraud, generating intelligence that can be used to stop attacks in their tracks.
Mitigate Financial & Reputational Losses from Major Breaches
Mitigate Financial & Reputational Losses from Major Breaches
Protect your institution and customers from the fallout that follows massive data breaches. Cybercriminals often create new accounts using personal identifiable information acquired on illegal black market forums. Easy Solutions’ Compromised Card Monitoring service finds when your users’ credentials are up for sale, letting you take action before any fraud can take place.
sales@easysol.net - www.easysol.net
Easy Solutions - All Rights Reserved