SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
+1-888-690-2424
entrust@entrust.com
entrust.com/financial-institutions

Entrust TransactionGuard for
Real-Time Fraud Detection

@Entrust

Detecting & Defeating Cross-Channel Fraud

/EntrustVideo

Advanced cyberthreats targeting global and national financial institutions
are growing in frequency and sophistication. Regulatory and market
pressures, regardless of geographic region, further strain banks’ ability
to dedicate the necessary time and resources to properly defend against
malicious malware and advanced fraud threats.

/EntrustSecurity

With a long-standing focus on the authentication and fraud market,
Entrust helps globally trusted FIs fight fraud in real-time with the most
comprehensive fraud-monitoring framework that provides the
deployment flexibility to monitor transactions across varied applications,
user communities and multiple access channels.

+entrust

DOWNLOAD
THIS DATA SHEET

Solution Benefits

šš

Detect, Defend & Adapt

Unlike competitive offerings limited
to transaction-based fraud detection,
Entrust TransactionGuard analyzes all points
of interaction with the user on a website,
allowing organizations to gain a complete
picture of potentially fraudulent behavior.
The zero-touch approach enables rapid
deployment into complex environments,
no invasive integration with banking
applications, and does not impact the
end-user experience.

šš

Provides comprehensive fraudmonitoring for user and
transaction anomalies

šš

Enables real-time, risk-score calculations
to immediately detect and stop
advanced fraud attacks

šš

Offers unmatched deployment
flexibility to tie seamlessly into
complex IT environments and
quickly react to new attack vectors

šš

Includes Rich APIs to integrate and
co-deploy with existing authentication
and fraud detection solutions as required
for a smooth migration strategy

šš

Delivers integrated case management,
forensic and reporting capabilities that
span the entire transaction session

Zero-Touch Security

Entrust TransactionGuard has evolved from
a real-time, transaction-monitoring system
to a state-of-the-art platform that blends
a number of approaches for an integrated
framework to help financial institutions
detect, defend and adapt to the fast-paced
fraud landscape.

Integrates with Entrust IdentityGuard
to form a comprehensive security
framework that helps address
regulatory guidelines for layered
security protection

Integrating Strong
Authentication
Entrust TransactionGuard works seamlessly
with Entrust IdentityGuard to layer security
— according to access requirements or the
risk of a given transaction — across diverse
users and applications. Detect fraud without
invasive integration with existing online
applications and step-up authentication
controls only when dictated by elevated risks.
uu
entrust.com/authentication

Regulatory Compliance
Coupled with Entrust IdentityGuard and
out-of-band transaction verification,
Entrust TransactionGuard provides
unmatched layered security that’s aligned
to the recommendations of the Federal
Financial Institutions Examination Council
(FFIEC) and leading FI security analyst firms.
Entrust TransactionGuard for Real-Time Fraud Detection
Detecting & Defeating Cross-Channel Fraud

  Real-Time Fraud Solution Architecture

Optional
Data Injection
via API

www

Zero-Touch Web Servers
Passive Listener

Business
Applications

Fraud Analyst

Entrust
Open Fraud
Intelligence
Network

Transaction
Monitoring

Optional Risk-Based Authentication

SOLUTION ARCHITECTURE
Comprehensive security for FIs. Entrust provides a proven architecture that delivers real-time fraud detection, risk-based authentication and critical information-sharing capabilities.

Solving a Complex Challenge
FIs are still learning to manage the explosive growth of the online
and mobile channels — and how to best secure related access and
transactions. These challenges are compounded by the complex
nature of existing fraud detection and security infrastructures
— typically silo approaches with separate, single-purpose solutions
that only analyze fraud from a narrow point of view.
More than “Front-Door” Monitoring
Entrust’s fraud-detection solution provides detailed “front-door”
monitoring from the moment a user hits the website to full “in-session”
analysis with the ability to monitor both transactional data and
underlying HTTP(S) access data.
This information includes navigation speeds and patterns, IP address
anomalies, and even detection of user-agent strings and HTML-injection
attacks. A truly comprehensive fraud-monitoring approach to detect
and defend against today’s most sophisticated attack vectors.

Real-Time Transaction Interdiction
Entrust provides real-time protection by transparently monitoring
user behavior to identify anomalies, then calculating the risk
associated with a particular transaction. If a risk is identified, step-up
authentication can be automatically invoked — leveraging
Entrust IdentityGuard — to complete the transaction.
This not only eliminates the need for fraud analysts to manually
contact customers, but helps ensure smooth, immediate transaction
completion improving the end-customer experience.
Proactive Malware & MITB Safeguards
High-risk transactions are managed according to business procedure
and the level of risk in real-time. Alert generation, case reporting
and workflow tools enable an organization to investigate and stop
fraudulent transactions before they clear or approve legitimate
business, without impacting the user — all necessary tools to help
stop man-in-the-browser attacks.
Enterprise-Wide Fraud Framework
Entrust TransactionGuard monitors an array of varied applications across the enterprise, each
supporting a distinct (or shared) fraud model. Leveraging a single tool to manage and monitor
fraud, across the enterprise, provides economies of scale. This empowers each application
owner to build a fraud model tuned to specific business characteristics and needs.

Cross-Channel Monitoring

Deep Fraud Analysis

As banks consolidate varied access channels to an XML/HTTPcentralized view of client activity, Entrust TransactionGuard
can monitor fraud across each separate channel. The solution’s
powerful HTTP-monitoring can extract countless data elements.

Entrust TransactionGuard offers an embedded case-management
module that provides fraud analysts with powerful tools to monitor
and investigate new fraud cases. The system supports group-based
policies so fraud teams only view and manage incidents related to
their customer base.

This capability provides unmatched flexibility on how to analyze
and detect anomalies across a broad range of HTTP-based channels
including online, mobile, ATM and others. Data may then be collated
across channels for true 360-degree insight to account activity.

Deployment Agility & Flexibility
Entrust TransactionGuard is offered in an on-premise deployment
model and provides customers with a range of options to meet the
needs of the most complex IT architecture. With a variety of options
to capture transactional data and integrate with third-party systems,
Entrust TransactionGuard provides the flexibility to implement
a new fraud framework with minimum IT impact and or requiring
the displacement of existing systems.

Included comprehensive tools enable deep insight to fraud threats
for individual user accounts or across the entire user population.
Entrust TransactionGuard can exchange (i.e., import and export)
data with external fraud systems, ensuring that disparate fraudmonitoring solutions are integrated to a single framework for
managing online fraud.

Rich API Abilities
For organizations with challenging data center requirements,
application nuances or a need to integrate external system data,
Entrust TransactionGuard supports rich fraud APIs that enable
transactional data, external feeds or third-party fraud alerts to
be injected into the fraud model.

Contingency Capabilities
The solution incorporates native server-redundancy, disaster-recovery
and load-balancing capabilities. It provides an architecture that meets
the most demanding scalability requirements across a range of
disparate user groups, business applications and geographic locations.

Speed & Adaptation
With today’s fraud landscape changing at an incredible pace, it is
even more important that a proven fraud detection solution evolves
and adapts quickly to meet ever-changing requirements. Entrust’s
solution provides incredible system agility — whether to deploy
a fraud mitigation technique to defend against a new threat vector
or to distribute a new authentication mechanism to a large user base
without a whole-scale system change.

Easy Integration
Quickly introduce new applications and start monitoring fraud rapidly.
Entrust TransactionGuard zero-touch monitoring allows transactional
data to be monitored without complex or expensive direct integration
to banking applications or deployment on end-user endpoints. Adding
new applications or incorporating new data feeds is a quick process
providing banks with the agility to stay on top of fraud threats.

Behavior Patterns
Entrust TransactionGuard includes an out-of-the-box library
of behavior pattern baselines and supports easily customizable
business rules, including the ability to download on-going updates
posted on the Entrust Open Fraud Intelligence Network (OFIN)
website. This helps significantly decrease the time between initial
deployment and full operation.
Entrust TransactionGuard for Real-Time Fraud Detection
Detecting & Defeating Cross-Channel Fraud

Real-Time Monitoring & Risk Control
Entrust TransactionGuard transparently monitors user behavior to identify anomalies, then
calculates the risk associated with a particular transaction — all seamlessly and in real time.
Using customizable, pre-built fraud rules and transaction signatures, the solution helps
identify anomalies such as:

šš

A user login from an unknown machine

šš

A user login from a risky IP address

šš

A user login from unknown locations or unlikely distances

šš

Transaction executions that are unusual for the user or part of a suspicious
system-wide pattern

šš

Varied man-in-the-browser attack vectors — in real time

Entrust provides
real-time protection
by transparently
monitoring user
behavior to identify
anomalies, then
calculating the risk
associated with a
particular transaction.
 

Monitor retail, mobile and commercial banking, and even any internally facing Web-based
applications, simultaneously and in real-time. All analysis is done transparently, is instantaneous
and does not require the application to be changed in any way or cause extra burden on the user.

A trusted provider of identity-based security solutions, Entrust secures governments,
enterprises and financial institutions in more than 5,000 organizations spanning
85 countries.
Entrust’s award-winning software authentication platforms manage today’s most secure
identity credentials, addressing customer pain points for cloud and mobile security,
physical and logical access, citizen eID initiatives, certificate management and SSL.
For more information about Entrust products and services, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com.

Company Facts
Website: www.entrust.com
Employees: 359
Customers: 5,000
Offices: 10 globally
Headquarters
Three Lincoln Centre
5430 LBJ Freeway, Suite 1250
Dallas, TX 75240 USA

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust
product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos
are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved.
22677/2-14

Contenu connexe

Plus de Entrust Datacard

Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? Entrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Plus de Entrust Datacard (8)

Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Entrust TransactionGuard for Real-Time Fraud Detection

  • 1. +1-888-690-2424 entrust@entrust.com entrust.com/financial-institutions Entrust TransactionGuard for Real-Time Fraud Detection @Entrust Detecting & Defeating Cross-Channel Fraud /EntrustVideo Advanced cyberthreats targeting global and national financial institutions are growing in frequency and sophistication. Regulatory and market pressures, regardless of geographic region, further strain banks’ ability to dedicate the necessary time and resources to properly defend against malicious malware and advanced fraud threats. /EntrustSecurity With a long-standing focus on the authentication and fraud market, Entrust helps globally trusted FIs fight fraud in real-time with the most comprehensive fraud-monitoring framework that provides the deployment flexibility to monitor transactions across varied applications, user communities and multiple access channels. +entrust DOWNLOAD THIS DATA SHEET Solution Benefits šš Detect, Defend & Adapt Unlike competitive offerings limited to transaction-based fraud detection, Entrust TransactionGuard analyzes all points of interaction with the user on a website, allowing organizations to gain a complete picture of potentially fraudulent behavior. The zero-touch approach enables rapid deployment into complex environments, no invasive integration with banking applications, and does not impact the end-user experience. šš Provides comprehensive fraudmonitoring for user and transaction anomalies šš Enables real-time, risk-score calculations to immediately detect and stop advanced fraud attacks šš Offers unmatched deployment flexibility to tie seamlessly into complex IT environments and quickly react to new attack vectors šš Includes Rich APIs to integrate and co-deploy with existing authentication and fraud detection solutions as required for a smooth migration strategy šš Delivers integrated case management, forensic and reporting capabilities that span the entire transaction session Zero-Touch Security Entrust TransactionGuard has evolved from a real-time, transaction-monitoring system to a state-of-the-art platform that blends a number of approaches for an integrated framework to help financial institutions detect, defend and adapt to the fast-paced fraud landscape. Integrates with Entrust IdentityGuard to form a comprehensive security framework that helps address regulatory guidelines for layered security protection Integrating Strong Authentication Entrust TransactionGuard works seamlessly with Entrust IdentityGuard to layer security — according to access requirements or the risk of a given transaction — across diverse users and applications. Detect fraud without invasive integration with existing online applications and step-up authentication controls only when dictated by elevated risks. uu entrust.com/authentication Regulatory Compliance Coupled with Entrust IdentityGuard and out-of-band transaction verification, Entrust TransactionGuard provides unmatched layered security that’s aligned to the recommendations of the Federal Financial Institutions Examination Council (FFIEC) and leading FI security analyst firms.
  • 2. Entrust TransactionGuard for Real-Time Fraud Detection Detecting & Defeating Cross-Channel Fraud   Real-Time Fraud Solution Architecture Optional Data Injection via API www Zero-Touch Web Servers Passive Listener Business Applications Fraud Analyst Entrust Open Fraud Intelligence Network Transaction Monitoring Optional Risk-Based Authentication SOLUTION ARCHITECTURE Comprehensive security for FIs. Entrust provides a proven architecture that delivers real-time fraud detection, risk-based authentication and critical information-sharing capabilities. Solving a Complex Challenge FIs are still learning to manage the explosive growth of the online and mobile channels — and how to best secure related access and transactions. These challenges are compounded by the complex nature of existing fraud detection and security infrastructures — typically silo approaches with separate, single-purpose solutions that only analyze fraud from a narrow point of view. More than “Front-Door” Monitoring Entrust’s fraud-detection solution provides detailed “front-door” monitoring from the moment a user hits the website to full “in-session” analysis with the ability to monitor both transactional data and underlying HTTP(S) access data. This information includes navigation speeds and patterns, IP address anomalies, and even detection of user-agent strings and HTML-injection attacks. A truly comprehensive fraud-monitoring approach to detect and defend against today’s most sophisticated attack vectors. Real-Time Transaction Interdiction Entrust provides real-time protection by transparently monitoring user behavior to identify anomalies, then calculating the risk associated with a particular transaction. If a risk is identified, step-up authentication can be automatically invoked — leveraging Entrust IdentityGuard — to complete the transaction. This not only eliminates the need for fraud analysts to manually contact customers, but helps ensure smooth, immediate transaction completion improving the end-customer experience. Proactive Malware & MITB Safeguards High-risk transactions are managed according to business procedure and the level of risk in real-time. Alert generation, case reporting and workflow tools enable an organization to investigate and stop fraudulent transactions before they clear or approve legitimate business, without impacting the user — all necessary tools to help stop man-in-the-browser attacks.
  • 3. Enterprise-Wide Fraud Framework Entrust TransactionGuard monitors an array of varied applications across the enterprise, each supporting a distinct (or shared) fraud model. Leveraging a single tool to manage and monitor fraud, across the enterprise, provides economies of scale. This empowers each application owner to build a fraud model tuned to specific business characteristics and needs. Cross-Channel Monitoring Deep Fraud Analysis As banks consolidate varied access channels to an XML/HTTPcentralized view of client activity, Entrust TransactionGuard can monitor fraud across each separate channel. The solution’s powerful HTTP-monitoring can extract countless data elements. Entrust TransactionGuard offers an embedded case-management module that provides fraud analysts with powerful tools to monitor and investigate new fraud cases. The system supports group-based policies so fraud teams only view and manage incidents related to their customer base. This capability provides unmatched flexibility on how to analyze and detect anomalies across a broad range of HTTP-based channels including online, mobile, ATM and others. Data may then be collated across channels for true 360-degree insight to account activity. Deployment Agility & Flexibility Entrust TransactionGuard is offered in an on-premise deployment model and provides customers with a range of options to meet the needs of the most complex IT architecture. With a variety of options to capture transactional data and integrate with third-party systems, Entrust TransactionGuard provides the flexibility to implement a new fraud framework with minimum IT impact and or requiring the displacement of existing systems. Included comprehensive tools enable deep insight to fraud threats for individual user accounts or across the entire user population. Entrust TransactionGuard can exchange (i.e., import and export) data with external fraud systems, ensuring that disparate fraudmonitoring solutions are integrated to a single framework for managing online fraud. Rich API Abilities For organizations with challenging data center requirements, application nuances or a need to integrate external system data, Entrust TransactionGuard supports rich fraud APIs that enable transactional data, external feeds or third-party fraud alerts to be injected into the fraud model. Contingency Capabilities The solution incorporates native server-redundancy, disaster-recovery and load-balancing capabilities. It provides an architecture that meets the most demanding scalability requirements across a range of disparate user groups, business applications and geographic locations. Speed & Adaptation With today’s fraud landscape changing at an incredible pace, it is even more important that a proven fraud detection solution evolves and adapts quickly to meet ever-changing requirements. Entrust’s solution provides incredible system agility — whether to deploy a fraud mitigation technique to defend against a new threat vector or to distribute a new authentication mechanism to a large user base without a whole-scale system change. Easy Integration Quickly introduce new applications and start monitoring fraud rapidly. Entrust TransactionGuard zero-touch monitoring allows transactional data to be monitored without complex or expensive direct integration to banking applications or deployment on end-user endpoints. Adding new applications or incorporating new data feeds is a quick process providing banks with the agility to stay on top of fraud threats. Behavior Patterns Entrust TransactionGuard includes an out-of-the-box library of behavior pattern baselines and supports easily customizable business rules, including the ability to download on-going updates posted on the Entrust Open Fraud Intelligence Network (OFIN) website. This helps significantly decrease the time between initial deployment and full operation.
  • 4. Entrust TransactionGuard for Real-Time Fraud Detection Detecting & Defeating Cross-Channel Fraud Real-Time Monitoring & Risk Control Entrust TransactionGuard transparently monitors user behavior to identify anomalies, then calculates the risk associated with a particular transaction — all seamlessly and in real time. Using customizable, pre-built fraud rules and transaction signatures, the solution helps identify anomalies such as: šš A user login from an unknown machine šš A user login from a risky IP address šš A user login from unknown locations or unlikely distances šš Transaction executions that are unusual for the user or part of a suspicious system-wide pattern šš Varied man-in-the-browser attack vectors — in real time Entrust provides real-time protection by transparently monitoring user behavior to identify anomalies, then calculating the risk associated with a particular transaction.   Monitor retail, mobile and commercial banking, and even any internally facing Web-based applications, simultaneously and in real-time. All analysis is done transparently, is instantaneous and does not require the application to be changed in any way or cause extra burden on the user. A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Company Facts Website: www.entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX 75240 USA Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved. 22677/2-14