SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Firco Continuity- Stripping Detector

STRIPPING DETECTOR
Protect Against Risk and Fines

Stripping Detector Module Key Benefits
Detect stripping
before a
transaction is
processed

Reduce manual
effort currently
necessary to
stop stripped
transactions

Stripping is intentional misconduct, internal or external,
that involves the practice of removing wire transfer
information such as customer names, bank names,
vessels and addresses. A resubmitted payment will
not be stopped by the filtering engine if the information
removed was the information matching the sanctions
lists. Financial institutions that have been found to “strip
transactions” or removing payment information from
resubmitted payments may be subject to significant fines
and risks.
Stripping also leaves the global financial system
vulnerable to terrorists, drug lords and weapons dealers,
and deprives law enforcement investigators of vital
information used to track illegal activities.

www.fircosoft.com | info@fircosoft.com

Protect your
financial
institution
against
risk and fines

With the risk of fines, penalties and a bank’s reputation at
stake, it is crucial that financial institutions have in place a
solution that can detect and block stripped transactions
before they can be processed.

Stripping Detector from
FircoSoft
FircoSoft’s Stripping Detector is designed to protect
financial institutions against processing payments that
have been purposefully altered. The solution is an add-on
to Firco Continuity, making it very simple to implement.
Designed to identify and block stripped messages in real
time, it has minimal impact on the filtering process or the
performance of the system.

Firco Continuity - Stripping Detector | 1
The solution can also be deployed with any watch list
filtering environment regardless of vendor or source files.

How Does it Work?
When a message is blocked or rejected by the sanctions
team, the transaction is stored in the database of
blocked transactions with a unique identifier code or
fingerprint assigned to each message.
The fingerprint is calculated on part of the message
that cannot be changed such as currency, amount,
ordering customer, beneficiary bank or other beneficiary
information. Rules to calculate the fingerprint are flexible
and easily customizable.
When a message enters Firco Continuity to be filtered,
its fingerprint is calculated. If that fingerprint matches
with one of the blocked transactions, the solution will
detect a “match” and the transaction will then enter
the Firco Continuity workflow for operator review and
decision.

What is Stripping?
Stripping is intentional misconduct,
internal or external, that involves the
practice of removing wire transfer
information such as customer names,
bank names, vessels and addresses
to prevent the filtering engine from
stopping the transactions. Because
of the information removed from the
wire, financial institutions are at risk
of processing transactions that are
not allowed by economic sanctions
programs.

Contact Us
Contact us today and learn how you can benefit from
reduced risk and increased protection against illegallystripped transactions being processed with our easily
deployable Stripping Detector.

Stripping Detector Schematic

Banking
Application

No : transaction is sent back
Manual Review for
Decision
Does the
fingerprint match an
alerted message

Yes : creation
of Stripping
Alert for review

Incoming
Transaction

Look-up

Database of Alerted
Messages

www.fircosoft.com | info@fircosoft.com

Dedicated alert
review screen for
stripping alerts.
Allows to easily spot
differences between
initial and altered
transaction.

Firco Continuity - Stripping Detector | 2

Contenu connexe

Tendances

The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remediesAltacit Global
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityDrupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityMediacurrent
 
Practical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProPractical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProSam Bowne
 
Information security
Information security Information security
Information security razendar79
 
Third-Party Risk Management at Accenture
Third-Party Risk Management at AccentureThird-Party Risk Management at Accenture
Third-Party Risk Management at Accentureaccenture
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Difference between FCPA and UKBA
Difference between FCPA and UKBADifference between FCPA and UKBA
Difference between FCPA and UKBANazmun Nahar
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 

Tendances (20)

TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remedies
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityDrupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal Security
 
Practical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProPractical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA Pro
 
Information security
Information security Information security
Information security
 
Third-Party Risk Management at Accenture
Third-Party Risk Management at AccentureThird-Party Risk Management at Accenture
Third-Party Risk Management at Accenture
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Difference between FCPA and UKBA
Difference between FCPA and UKBADifference between FCPA and UKBA
Difference between FCPA and UKBA
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 

Similaire à FircoSoft Stripping detector

Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochurePaul Stabile
 
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationFTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationBrent Hillyer
 
Robocalling services - Prescott Martini.pptx
Robocalling services - Prescott Martini.pptxRobocalling services - Prescott Martini.pptx
Robocalling services - Prescott Martini.pptxPrescott Martini
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSafeDeposit
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
How to fight chargebacks. part 1
How to fight chargebacks. part 1How to fight chargebacks. part 1
How to fight chargebacks. part 1Ikajo International
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens BankMichael Ouellet
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 

Similaire à FircoSoft Stripping detector (20)

Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationFTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
 
Robocalling services - Prescott Martini.pptx
Robocalling services - Prescott Martini.pptxRobocalling services - Prescott Martini.pptx
Robocalling services - Prescott Martini.pptx
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
SMART-AML_A4.EN.ciq
SMART-AML_A4.EN.ciqSMART-AML_A4.EN.ciq
SMART-AML_A4.EN.ciq
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
 
OFAC Screening Software
OFAC Screening SoftwareOFAC Screening Software
OFAC Screening Software
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Aggregation Platforms-White Paper
Aggregation Platforms-White PaperAggregation Platforms-White Paper
Aggregation Platforms-White Paper
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Xpert AML Brochure
Xpert AML BrochureXpert AML Brochure
Xpert AML Brochure
 
How to fight chargebacks. part 1
How to fight chargebacks. part 1How to fight chargebacks. part 1
How to fight chargebacks. part 1
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 

FircoSoft Stripping detector

  • 1. Firco Continuity- Stripping Detector STRIPPING DETECTOR Protect Against Risk and Fines Stripping Detector Module Key Benefits Detect stripping before a transaction is processed Reduce manual effort currently necessary to stop stripped transactions Stripping is intentional misconduct, internal or external, that involves the practice of removing wire transfer information such as customer names, bank names, vessels and addresses. A resubmitted payment will not be stopped by the filtering engine if the information removed was the information matching the sanctions lists. Financial institutions that have been found to “strip transactions” or removing payment information from resubmitted payments may be subject to significant fines and risks. Stripping also leaves the global financial system vulnerable to terrorists, drug lords and weapons dealers, and deprives law enforcement investigators of vital information used to track illegal activities. www.fircosoft.com | info@fircosoft.com Protect your financial institution against risk and fines With the risk of fines, penalties and a bank’s reputation at stake, it is crucial that financial institutions have in place a solution that can detect and block stripped transactions before they can be processed. Stripping Detector from FircoSoft FircoSoft’s Stripping Detector is designed to protect financial institutions against processing payments that have been purposefully altered. The solution is an add-on to Firco Continuity, making it very simple to implement. Designed to identify and block stripped messages in real time, it has minimal impact on the filtering process or the performance of the system. Firco Continuity - Stripping Detector | 1
  • 2. The solution can also be deployed with any watch list filtering environment regardless of vendor or source files. How Does it Work? When a message is blocked or rejected by the sanctions team, the transaction is stored in the database of blocked transactions with a unique identifier code or fingerprint assigned to each message. The fingerprint is calculated on part of the message that cannot be changed such as currency, amount, ordering customer, beneficiary bank or other beneficiary information. Rules to calculate the fingerprint are flexible and easily customizable. When a message enters Firco Continuity to be filtered, its fingerprint is calculated. If that fingerprint matches with one of the blocked transactions, the solution will detect a “match” and the transaction will then enter the Firco Continuity workflow for operator review and decision. What is Stripping? Stripping is intentional misconduct, internal or external, that involves the practice of removing wire transfer information such as customer names, bank names, vessels and addresses to prevent the filtering engine from stopping the transactions. Because of the information removed from the wire, financial institutions are at risk of processing transactions that are not allowed by economic sanctions programs. Contact Us Contact us today and learn how you can benefit from reduced risk and increased protection against illegallystripped transactions being processed with our easily deployable Stripping Detector. Stripping Detector Schematic Banking Application No : transaction is sent back Manual Review for Decision Does the fingerprint match an alerted message Yes : creation of Stripping Alert for review Incoming Transaction Look-up Database of Alerted Messages www.fircosoft.com | info@fircosoft.com Dedicated alert review screen for stripping alerts. Allows to easily spot differences between initial and altered transaction. Firco Continuity - Stripping Detector | 2