SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
White Paper
IBM Analytics Financial Services
IBM Counter Financial Crimes
Management
Gain superior clarity on identities and relationships linked
to financial crime activities with entity analytics
2 IBM Counter Financial Crimes Management
Fraud, money laundering and other financial crimes are a
thorn in the side of every financial institution. These activities
can cut into profits, damage public trust and expose banks to
massive regulatory penalties if found to be out of compliance
with governmental regulations. Many organizations simply
accept financial crime as an inevitable cost of doing business.
But today, armed with advanced identity resolution and new
kinds of analytics, financial institutions have powerful tools at
their disposal to reduce fraud and money laundering.
The IBM® Counter Financial Crimes Management solution
offers rich analytics that help banks gain a clearer view of
entities, relationships and hidden patterns as they deal with
financial crimes including anti–money laundering (AML),
anti-terrorist financing and various types of fraud. It provides
an ecosystem of analytical and investigative tools designed to
work together as a single, integrated solution. By using the
solution to gain deeper insights into customers, relationships
and context, financial institutions are better equipped to meet
regulatory requirements and prevent financial crimes before
they occur.
Increased AML requirements necessitate
more robust countermeasures
Today’s cybercriminals are agile and technology-savvy,
driving ever-more sophisticated attacks on the industry. They
are also highly organized, with more than 80 percent of
cybercrime acts estimated to originate from some form of
organized activity.1
Money laundering schemes frequently
include both shell companies and fictitious people, and they
change constantly to conceal illicit activity and assets. As a
result, money laundering risks are given regular and formal
attention at board meetings—and for good reason.
The frequency of money laundering schemes is on the rise.
An estimated 2 to 5 percent of global GDP, or USD800 billion
to USD2 trillion, is laundered each year.2
Specific to
developing and emerging economies, the impact was USD6.6
trillion in illicit financial flows from 2003 through 2012.3
Regulators are increasing and strengthening regulatory
requirements in an effort to address the upward trend of
complex financial crimes. Evidence of this sentiment may be
found in the highly anticipated release of the US Treasury
Department’s new customer due diligence (CDD) requirements
and the European Union’s latest AML directive. These
proposed rules are designed to enforce more rigorous CDD
tracking, which will enhance financial transparency and help
safeguard the financial system against illicit use. They will also
include an improved regulatory requirement to identify
beneficiaries of legal entities, subject to certain exemptions and
enhanced due diligence (EDD) when individuals or groups are
identified as qualifying for exemptions.
Compliance with these new regulations compels institutions
to make more informed, insightful and consistent decisions
that strengthen the effectiveness of compliance programs.
Implementing these changes can be operationally and
technologically burdensome. But noncompliance with AML
laws carries a hefty penalty and the fines for violations of
AML and CDD may be directed at either senior executives or
institutions. In 2012 HSBC agreed to pay a record $1.92 billion
in fines to U.S. authorities. And while in 2014 only 45
anti-money laundering (AML) infractions were issued, the
penalty costs rose. Banks paid USD351 million in 2014, or
roughly 7 times the fines levied in the previous year, excluding
concurrent fines with fines being levied on the c-suite as well.
IBM Analytics 3
Understanding customer relationships is
vital to fighting financial crime
Financial crimes can be complex, often spanning
national borders. Combatting them involves a range of
challenges, including:
•	 Correctly identifying a bank’s “customer”, whether it be an
individual or organizations
•	 Understanding hidden patterns and relationships among
customers
•	 Covering the cost of investigations and compliance
reporting
•	 Reducing false positives to prevent unnecessary investigation
of legitimate transactions
•	 Increasing detection speed to limit losses and customers’
exposure
To detect suspicious activities, institutions must understand
more than just their own customers—they need a clear
understanding of their customers’ customers as well.
Unfortunately, most financial institutions currently use rule
or profile-based engines that are not agile enough to adapt to
today’s fraud and AML’s ever-changing schemes. Anticipating
that newer tools and processes will be required to keep up
with these changes, financial institutions also insist that any
technology change must augment—not replace—the
significant investments they have already made in fraud and
AML systems.
The IBM Counter Financial Crimes Management solution
helps banks tackle these challenges with a multilayered
ecosystem of complementary analytical techniques, including
crucial entity analytics capabilities.
The solution is designed to complement organizations’
existing investments in anti–financial crimes technology. It
helps eliminate information silos, expands the observation
space and enables unified enterprise business intelligence.
By using a full array of tightly woven big data, entity and
predictive analytics capabilities, the solution can analyze data
from both internal and external intelligence sources. This
allows financial institutions to mix and match the right tools
to apply to each unique fraud or financial crime scenario.
Entity and relationship analytics help
banks understand customers in real time
Understanding whether the bank is working with the right
person and whether each transaction is legitimate is vital
throughout the entire customer lifecycle—from account
opening through every deposit, transfer, investment and
withdrawal. The Context Computing features within IBM
Counter Financial Crimes Management leverage advanced
entity analytics specifically optimized to recognize nefarious
individuals and organizations in spite of sophisticated
attempts to mask their identities, unscrupulous relationships
and activities.
There are three vital aspects of knowing your customer:
1.	Identity resolution (who is who?): By accumulating
identity context over time, the entity analytics feature uses
various enterprise sources of information to determine
whether individuals really are who they say they are.
Proprietary IBM Context Computing technology looks
at these attributes across time to help ensure the most
accurate identity and determines whether a previous
assumption should be corrected based on new facts.
4 IBM Counter Financial Crimes Management
2.	Relationship resolution (who knows who?): Once
accurate identity is established, complex relationships can
be uncovered. The system processes resolved identity data
to determine whether people are—or ever have been—
related in any way.
3.	Multilayered analytical processing (who does what?):
With “who is who” and “who knows who” well established,
the IBM Counter Financial Crimes Management solution
then applies additional layers of analytics processing to
evaluate all transactional and non-transactional behavior of
the entity—and optionally, of associated entities as well—to
assess downstream compliance and fraud risks.
An enterprise-wide view of each customer across all lines of
business and geographies is needed to clearly identify and
understand the associated relationships. By establishing this
comprehensive view at the start of the customer relationship,
financial institutions dramatically reduce opportunities for
new account fraud and increase their odds of discovering
well-concealed criminal activities.
Name resolution is an important—albeit often problematic—
part of these processes. There are no consistent standards for
names. Some countries mandate standards, but they vary
from country to country. Nicknames, transliterations
between languages, multiple family names (common in many
countries), different orders of names and many other factors
make the variations appear very different.
In addition, personal and corporate names are often
represented differently in diverse onboarding systems, or the
people involved may provide conflicting information. Often,
this is unintentional and the result of human error (for example,
names are mistyped or misspelled), or the same person may
have different roles within the same company (beneficiary in
one instance, account holder in another). Intentional
misrepresentation of identities, however, is typically a sign
of fraud.
Build entity and relationship awareness
In isolation, no single data point is particularly useful in
allowing financial institutions to understand customers—
but in context, the information begins to create a
comprehensive picture.
IBM Context Computing technology features look at
individual data points much like jigsaw puzzle pieces. By
looking for relationships between pieces, entity analytics can
take a large data set and begin identifying which pieces may
be related, as well as which are connected (see Figure 1). And,
additional connections will be established as the bank continues
to tap into other data sources from within the corporation
along with various external sources and watch lists.
As more connections are made over time, the relationships
become more apparent and fitting new pieces of data into the
overall picture becomes easier. Each element refines the complete
view, providing greater clarity and more focused insight.
IBM Analytics 5
A holistic solution that incorporates the
strength of entity analytics
The IBM Counter Financial Crimes Management solution
delivers a comprehensive array of analytical and investigative
capabilities that work together as a single, integrated solution
within a common framework and data model.
Identity and relationship disambiguation: To help
financial institutions recognize and mitigate the incidence
of fraud, deception and collusion, IBM Counter Financial
Crimes Management provides identity and relationship
disambiguation technology based on context accumulation
principles along with complex event processing (see Figure 2).
Figure 1. IBM Counter Financial Crimes Management leverages entity and forensic analysis and automated discovery to display unknown relationships
for investigation.
6 IBM Counter Financial Crimes Management
Figure 2. As data from multiple sources is pieced together over time, the entity analytics engine within IBM Counter Financial Crimes Management creates
rich visualizations to show who is who, who knows whom and who’s doing what.
!
!
!
!
!
!
!
World-Check
ChoicePoint
Dun  Bradstreet
Dow Jones/Factiva
LexisNexis
Experian
Acxiom
DataQuick
US Office of
Foreign Assets
Control
watch list
Potentially
exposed
person list
US Directorate
of Defense
Trade Controls
debarred parties
Bank of
England list
FBI most
wanted list
Interpol
terrorist
suspects
SAR/STR Employee Customer Vendor ACCT
Threat  fraud intelligence
real-time repository
Account opening
KYC
Filtering software
Watch list hits
Transactional AML
SAR/STR
Risk management
and governance
Case
management
Pattern analysis
Data mining
Ontology
Drill-down
queries
ALERT
ALERT
ALERT
ALERT
SUBPOENA
FOLLOW
SEARCH
External data
Internal information assets
Front-lineapplicationsInvestigativetools
Watch lists
IBM Analytics 7
The solution uses entity-centric learning when comparing new
data records against context. Entities comprise multiple data
records, each of which contains its own unique attributes. New
records are compared to all of the entity’s attributes, even if
those attributes were sourced from different records.
Continuous learning: Determining an identity involves
making assertions based on context and using those insights
for downstream analysis. When new information determines
that a previous assertion is no longer valid, IBM Counter
Financial Crimes Management will automatically correct the
assertion and create an audit trail so overseers can track the
changes made to each record.
Rapid risk scoring: IBM Counter Financial Crimes
Management incorporates rapid risk scoring capabilities
that help financial institutions perform sanctions screening
and reduce false positives by identifying legitimate
transactions quickly.
Data set mapping: The solution can map internal and
external data sets (including unstructured data). These
capabilities provide an enhanced understanding of customers
and their business relationships while creating a network link
graph for further analysis.
Historical recall: Fully attributed historical recall enables
banks to get context on the sources of information. Each data
record comes from a unique source; the system remembers
what the original record looked like and where it came from.
This capability helps investigators completely understand the
analytics and make the results actionable.
Customers, relationships and context:
Critical for crime prevention
With greater insights into customers, relationships and
context, financial institutions may gain significant regulatory,
operational and technology benefits. More accurate results
help reduce regulatory risks. In addition, improvements in the
effectiveness and efficiency of anti-fraud and AML initiatives
can reduce false positives. Once they achieve clarity into
customer behaviors and relationships, financial institutions
can leverage predictive analytics technologies to perform
more effective risk scoring. Analyzing false positives and
negatives enhances predictive analytics and improve risk
scoring for future transactions. In this way, IBM Counter
Financial Crimes Management with entity analytics
enables financial organizations to continually learn and
expand their financial crime prevention strategies.
Context Computing at work: MoneyGram International
By resolving entities and relationships with entity analytics,
MoneyGram International managers can better understand
who is using the company’s services. This knowledge
has helped them prevent more than USD37.7 million in
fraudulent transactions, reduce customer fraud complaints
by 72 percent and quickly address regulatory requirements.
Learn more at ibm.com/software/businesscasestudies/us/
en/corp?synkey=Y423188O11007S71
© Copyright IBM Corporation 2015
IBM Analytics
Route 100
Somers, NY 10589
Produced in the United States of America
June 2015
IBM, the IBM logo, and ibm.com are trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A
current list of IBM trademarks is available on the web at “Copyright and
trademark information” at ibm.com/legal/copytrade.shtml
This document is current as of the initial date of publication and may be
changed by IBM at any time. Not all offerings are available in every country in
which IBM operates.
The performance data and client examples cited are presented for illustrative
purposes only.Actual performance results may vary depending on specific
configurations and operating conditions.THE INFORMATION IN THIS
DOCUMENT IS PROVIDED “AS IS”WITHOUT ANY WARRANTY,
EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION
OF NON-INFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.
The client is responsible for ensuring compliance with laws and regulations
applicable to it. IBM does not provide legal advice or represent or warrant that
its services or products will ensure that the client is in compliance with any law
or regulation.
1
United Nations Office on Drugs and Crime, “Comprehensive Study on
Cybercrime,” February 2013, www.unodc.org/documents/organized-
crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
2
United Nations Office on Drugs and Crime, “Money-Laundering and
Globalization,” www.unodc.org/unodc/en/money-laundering/
globalization.html
3
Global Financial Integrity, “Illicit Financial Flows from the Developing
World: 2003-2012,” December 2014, www.gfintegrity.org/report/2014-
global-report-illicit-financial-flows-from-developing-countries-2003-2012
Please Recycle
ASW12345-USEN-00
For more information
To learn more about IBM Counter Financial Crimes
Management solution with entity analytics, please contact your
IBM representative or visit: www.smartercounterfraud.com
Additionally, IBM Global Financing can help you acquire the
software capabilities that your business needs in the most
cost-effective and strategic way possible. We’ll partner with
credit-qualified clients to customize a financing solution to
suit your business and development goals, enable effective
cash management, and improve your total cost of ownership.
Fund your critical IT investment and propel your business
forward with IBM Global Financing. For more information,
visit: ibm.com/financing

Contenu connexe

Tendances

National payment system architecture
National payment system architectureNational payment system architecture
National payment system architectureAnil Chaurasiya
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBACAjit Dadresa
 
Financial Crime Compliance
Financial Crime ComplianceFinancial Crime Compliance
Financial Crime ComplianceAdnan Tabassum
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learningwgyn
 
도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기JangHyuk You
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트)
온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트) 온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트)
온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트) NAVER CLOUD PLATFORMㅣ네이버 클라우드 플랫폼
 
멀티 클라우드 시대의 정보보호 관리체계
멀티 클라우드 시대의 정보보호 관리체계멀티 클라우드 시대의 정보보호 관리체계
멀티 클라우드 시대의 정보보호 관리체계Logpresso
 
Ruby & Rails Error Handling
Ruby & Rails Error HandlingRuby & Rails Error Handling
Ruby & Rails Error HandlingSimon Maynard
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banksPankaj Baid
 
MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018
MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018
MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018Amazon Web Services Korea
 
Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러Heungsub Lee
 
OWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsOWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsKaty Anton
 
IT전략계획- 03.IT 도입계획
IT전략계획- 03.IT 도입계획IT전략계획- 03.IT 도입계획
IT전략계획- 03.IT 도입계획InGuen Hwang
 
Asm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchAsm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchLior Rotkovitch
 
[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO
[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO
[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTOiFunFactory Inc.
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionJérôme Kehrli
 
전자금융 산업 및 핀테크의 이해
전자금융 산업 및 핀테크의 이해전자금융 산업 및 핀테크의 이해
전자금융 산업 및 핀테크의 이해재식 전
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and PracticesPrabath Siriwardena
 

Tendances (20)

National payment system architecture
National payment system architectureNational payment system architecture
National payment system architecture
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBAC
 
Financial Crime Compliance
Financial Crime ComplianceFinancial Crime Compliance
Financial Crime Compliance
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learning
 
도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트)
온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트) 온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트)
온라인 교육 시리즈 - 클라우드 기반의 마이데이터사업 혁신(김민형 클라우드 솔루션 아키텍트)
 
멀티 클라우드 시대의 정보보호 관리체계
멀티 클라우드 시대의 정보보호 관리체계멀티 클라우드 시대의 정보보호 관리체계
멀티 클라우드 시대의 정보보호 관리체계
 
Ruby & Rails Error Handling
Ruby & Rails Error HandlingRuby & Rails Error Handling
Ruby & Rails Error Handling
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banks
 
MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018
MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018
MSA를 넘어 Function의 로의 진화::주경호 수석::AWS Summit Seoul 2018
 
Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러
 
OWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsOWASP Top 10 Proactive Controls
OWASP Top 10 Proactive Controls
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
IT전략계획- 03.IT 도입계획
IT전략계획- 03.IT 도입계획IT전략계획- 03.IT 도입계획
IT전략계획- 03.IT 도입계획
 
Asm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchAsm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitch
 
[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO
[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO
[MGDC] 리눅스 게임 서버 성능 분석하기 - 아이펀팩토리 김진욱 CTO
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
 
전자금융 산업 및 핀테크의 이해
전자금융 산업 및 핀테크의 이해전자금융 산업 및 핀테크의 이해
전자금융 산업 및 핀테크의 이해
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 

En vedette

Various Solutions to the Problem of Points
Various Solutions to the Problem of PointsVarious Solutions to the Problem of Points
Various Solutions to the Problem of Pointswgyn
 
201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detectionRik Van Bruggen
 
IBM Counter Fraud Management
IBM Counter Fraud ManagementIBM Counter Fraud Management
IBM Counter Fraud ManagementAngela Tuminello
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Cartographie du big data
Cartographie du big dataCartographie du big data
Cartographie du big dataacogoluegnes
 
Real-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and KafkaReal-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and KafkaAlexey Kharlamov
 
Real time fraud detection at 1+M scale on hadoop stack
Real time fraud detection at 1+M scale on hadoop stackReal time fraud detection at 1+M scale on hadoop stack
Real time fraud detection at 1+M scale on hadoop stackDataWorks Summit/Hadoop Summit
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Andrea Dal Pozzolo
 
Fraud Detection with Neo4j
Fraud Detection with Neo4jFraud Detection with Neo4j
Fraud Detection with Neo4jNeo4j
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsChristian Gügi
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesNeo4j
 
Credit Fraud Prevention with Spark and Graph Analysis
Credit Fraud Prevention with Spark and Graph AnalysisCredit Fraud Prevention with Spark and Graph Analysis
Credit Fraud Prevention with Spark and Graph AnalysisJen Aman
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...Kai Wähner
 
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...Big Data Spain
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud DetectionNitesh Kumar
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management systemsflynn073
 

En vedette (20)

Various Solutions to the Problem of Points
Various Solutions to the Problem of PointsVarious Solutions to the Problem of Points
Various Solutions to the Problem of Points
 
201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection
 
IBM Counter Fraud Management
IBM Counter Fraud ManagementIBM Counter Fraud Management
IBM Counter Fraud Management
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Cartographie du big data
Cartographie du big dataCartographie du big data
Cartographie du big data
 
Real-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and KafkaReal-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and Kafka
 
Real time fraud detection at 1+M scale on hadoop stack
Real time fraud detection at 1+M scale on hadoop stackReal time fraud detection at 1+M scale on hadoop stack
Real time fraud detection at 1+M scale on hadoop stack
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Fraud Detection with Neo4j
Fraud Detection with Neo4jFraud Detection with Neo4j
Fraud Detection with Neo4j
 
Financial Fraud Paper
Financial Fraud PaperFinancial Fraud Paper
Financial Fraud Paper
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph Databases
 
Credit Fraud Prevention with Spark and Graph Analysis
Credit Fraud Prevention with Spark and Graph AnalysisCredit Fraud Prevention with Spark and Graph Analysis
Credit Fraud Prevention with Spark and Graph Analysis
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
 
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 

Similaire à IBM Counter Financial Crimes Management

EAI Checklist
EAI ChecklistEAI Checklist
EAI ChecklistIdeba
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Santhosh L
 
Employer 0409
Employer 0409Employer 0409
Employer 0409dgade
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network AnalysisCogitate.us
 
How will AML help your bank's reputation and profitability?
How will AML help your bank's reputation and profitability?How will AML help your bank's reputation and profitability?
How will AML help your bank's reputation and profitability?NLS Banking Solutions
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
 
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small BusinessesStudy: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businessesclaytonroot
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfssuser7464571
 
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...Kavika Roy
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Top of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, JanuaryTop of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, JanuaryTakishaPeck109
 
GRC and Anti-Money Laundering Services.pdf
GRC and Anti-Money Laundering Services.pdfGRC and Anti-Money Laundering Services.pdf
GRC and Anti-Money Laundering Services.pdfbasilmph
 
Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Paul Hamilton
 
5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer NeedsAlisa Karybina
 
Deloitte Dbriefs Program Guide | April - June 2014
Deloitte Dbriefs   Program Guide | April - June 2014Deloitte Dbriefs   Program Guide | April - June 2014
Deloitte Dbriefs Program Guide | April - June 2014Franco Ferrario
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 

Similaire à IBM Counter Financial Crimes Management (20)

EAI Checklist
EAI ChecklistEAI Checklist
EAI Checklist
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network Analysis
 
How will AML help your bank's reputation and profitability?
How will AML help your bank's reputation and profitability?How will AML help your bank's reputation and profitability?
How will AML help your bank's reputation and profitability?
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
 
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small BusinessesStudy: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Top of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, JanuaryTop of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, January
 
GRC and Anti-Money Laundering Services.pdf
GRC and Anti-Money Laundering Services.pdfGRC and Anti-Money Laundering Services.pdf
GRC and Anti-Money Laundering Services.pdf
 
Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey
 
Aml0109
Aml0109Aml0109
Aml0109
 
5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs
 
Deloitte Dbriefs Program Guide | April - June 2014
Deloitte Dbriefs   Program Guide | April - June 2014Deloitte Dbriefs   Program Guide | April - June 2014
Deloitte Dbriefs Program Guide | April - June 2014
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 

Plus de Virginia Fernandez

=Ven a conocer la plataforma cloud de IBM!
=Ven a conocer la plataforma cloud de IBM! =Ven a conocer la plataforma cloud de IBM!
=Ven a conocer la plataforma cloud de IBM! Virginia Fernandez
 
Cloud Hibrido, Llave de la evolucion empresarial
Cloud Hibrido, Llave de la evolucion empresarialCloud Hibrido, Llave de la evolucion empresarial
Cloud Hibrido, Llave de la evolucion empresarialVirginia Fernandez
 
Computing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMComputing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMVirginia Fernandez
 
Deliveling Intellingent Transport Systems - IBM
Deliveling Intellingent Transport Systems - IBMDeliveling Intellingent Transport Systems - IBM
Deliveling Intellingent Transport Systems - IBMVirginia Fernandez
 
10 ways that cognition is shaping the future of smart buildings
10 ways that cognition is shaping the future of smart buildings10 ways that cognition is shaping the future of smart buildings
10 ways that cognition is shaping the future of smart buildingsVirginia Fernandez
 
IBM Cognos Analytics - Aumente la inteligencia de toda su empresa
IBM Cognos Analytics - Aumente la inteligencia de toda su empresaIBM Cognos Analytics - Aumente la inteligencia de toda su empresa
IBM Cognos Analytics - Aumente la inteligencia de toda su empresaVirginia Fernandez
 
IBM Security Summit 2016 - 21 de Septiembre, Madrid.
IBM Security Summit 2016 - 21 de Septiembre, Madrid.IBM Security Summit 2016 - 21 de Septiembre, Madrid.
IBM Security Summit 2016 - 21 de Septiembre, Madrid.Virginia Fernandez
 
3 New ways to Improve and Understand your Customers Experience
3 New ways to Improve and Understand your Customers Experience3 New ways to Improve and Understand your Customers Experience
3 New ways to Improve and Understand your Customers ExperienceVirginia Fernandez
 
IBM Marketing Cloud mobile solutions
IBM Marketing Cloud mobile solutionsIBM Marketing Cloud mobile solutions
IBM Marketing Cloud mobile solutionsVirginia Fernandez
 
Ibm Cognitive Computing Insurance
Ibm Cognitive Computing InsuranceIbm Cognitive Computing Insurance
Ibm Cognitive Computing InsuranceVirginia Fernandez
 
IBM ExperienceOne for E -Commerce
IBM ExperienceOne for E -CommerceIBM ExperienceOne for E -Commerce
IBM ExperienceOne for E -CommerceVirginia Fernandez
 
What's New in Predictive Analytics IBM SPSS
What's New in Predictive Analytics IBM SPSSWhat's New in Predictive Analytics IBM SPSS
What's New in Predictive Analytics IBM SPSSVirginia Fernandez
 
What Watson Explorer is and How it works
What Watson Explorer is and How it worksWhat Watson Explorer is and How it works
What Watson Explorer is and How it worksVirginia Fernandez
 
IBM Customer Engagement Solution - Retail industry
IBM Customer Engagement Solution - Retail industryIBM Customer Engagement Solution - Retail industry
IBM Customer Engagement Solution - Retail industryVirginia Fernandez
 

Plus de Virginia Fernandez (20)

=Ven a conocer la plataforma cloud de IBM!
=Ven a conocer la plataforma cloud de IBM! =Ven a conocer la plataforma cloud de IBM!
=Ven a conocer la plataforma cloud de IBM!
 
Cloud Hibrido, Llave de la evolucion empresarial
Cloud Hibrido, Llave de la evolucion empresarialCloud Hibrido, Llave de la evolucion empresarial
Cloud Hibrido, Llave de la evolucion empresarial
 
IBM: The Value of Training
IBM: The Value of TrainingIBM: The Value of Training
IBM: The Value of Training
 
Computing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMComputing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBM
 
Deliveling Intellingent Transport Systems - IBM
Deliveling Intellingent Transport Systems - IBMDeliveling Intellingent Transport Systems - IBM
Deliveling Intellingent Transport Systems - IBM
 
10 ways that cognition is shaping the future of smart buildings
10 ways that cognition is shaping the future of smart buildings10 ways that cognition is shaping the future of smart buildings
10 ways that cognition is shaping the future of smart buildings
 
IBM Cognos Analytics - Aumente la inteligencia de toda su empresa
IBM Cognos Analytics - Aumente la inteligencia de toda su empresaIBM Cognos Analytics - Aumente la inteligencia de toda su empresa
IBM Cognos Analytics - Aumente la inteligencia de toda su empresa
 
IBM Security Summit 2016 - 21 de Septiembre, Madrid.
IBM Security Summit 2016 - 21 de Septiembre, Madrid.IBM Security Summit 2016 - 21 de Septiembre, Madrid.
IBM Security Summit 2016 - 21 de Septiembre, Madrid.
 
IBM Containers- Bluemix
IBM Containers- BluemixIBM Containers- Bluemix
IBM Containers- Bluemix
 
3 New ways to Improve and Understand your Customers Experience
3 New ways to Improve and Understand your Customers Experience3 New ways to Improve and Understand your Customers Experience
3 New ways to Improve and Understand your Customers Experience
 
IBM Marketing Cloud mobile solutions
IBM Marketing Cloud mobile solutionsIBM Marketing Cloud mobile solutions
IBM Marketing Cloud mobile solutions
 
IBM DevOps Solution - Bluemix
IBM DevOps Solution - BluemixIBM DevOps Solution - Bluemix
IBM DevOps Solution - Bluemix
 
Ibm Cognitive Computing Insurance
Ibm Cognitive Computing InsuranceIbm Cognitive Computing Insurance
Ibm Cognitive Computing Insurance
 
IBM Watson-How it works
IBM Watson-How it worksIBM Watson-How it works
IBM Watson-How it works
 
IBM ExperienceOne for E -Commerce
IBM ExperienceOne for E -CommerceIBM ExperienceOne for E -Commerce
IBM ExperienceOne for E -Commerce
 
IBM Cloud Innovation Day
IBM Cloud Innovation DayIBM Cloud Innovation Day
IBM Cloud Innovation Day
 
What's New in Predictive Analytics IBM SPSS
What's New in Predictive Analytics IBM SPSSWhat's New in Predictive Analytics IBM SPSS
What's New in Predictive Analytics IBM SPSS
 
What Watson Explorer is and How it works
What Watson Explorer is and How it worksWhat Watson Explorer is and How it works
What Watson Explorer is and How it works
 
IBM Customer Engagement Solution - Retail industry
IBM Customer Engagement Solution - Retail industryIBM Customer Engagement Solution - Retail industry
IBM Customer Engagement Solution - Retail industry
 
How does IBM Bluemix work?
How does IBM Bluemix work?How does IBM Bluemix work?
How does IBM Bluemix work?
 

Dernier

Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsJoseMangaJr1
 

Dernier (20)

Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 

IBM Counter Financial Crimes Management

  • 1. White Paper IBM Analytics Financial Services IBM Counter Financial Crimes Management Gain superior clarity on identities and relationships linked to financial crime activities with entity analytics
  • 2. 2 IBM Counter Financial Crimes Management Fraud, money laundering and other financial crimes are a thorn in the side of every financial institution. These activities can cut into profits, damage public trust and expose banks to massive regulatory penalties if found to be out of compliance with governmental regulations. Many organizations simply accept financial crime as an inevitable cost of doing business. But today, armed with advanced identity resolution and new kinds of analytics, financial institutions have powerful tools at their disposal to reduce fraud and money laundering. The IBM® Counter Financial Crimes Management solution offers rich analytics that help banks gain a clearer view of entities, relationships and hidden patterns as they deal with financial crimes including anti–money laundering (AML), anti-terrorist financing and various types of fraud. It provides an ecosystem of analytical and investigative tools designed to work together as a single, integrated solution. By using the solution to gain deeper insights into customers, relationships and context, financial institutions are better equipped to meet regulatory requirements and prevent financial crimes before they occur. Increased AML requirements necessitate more robust countermeasures Today’s cybercriminals are agile and technology-savvy, driving ever-more sophisticated attacks on the industry. They are also highly organized, with more than 80 percent of cybercrime acts estimated to originate from some form of organized activity.1 Money laundering schemes frequently include both shell companies and fictitious people, and they change constantly to conceal illicit activity and assets. As a result, money laundering risks are given regular and formal attention at board meetings—and for good reason. The frequency of money laundering schemes is on the rise. An estimated 2 to 5 percent of global GDP, or USD800 billion to USD2 trillion, is laundered each year.2 Specific to developing and emerging economies, the impact was USD6.6 trillion in illicit financial flows from 2003 through 2012.3 Regulators are increasing and strengthening regulatory requirements in an effort to address the upward trend of complex financial crimes. Evidence of this sentiment may be found in the highly anticipated release of the US Treasury Department’s new customer due diligence (CDD) requirements and the European Union’s latest AML directive. These proposed rules are designed to enforce more rigorous CDD tracking, which will enhance financial transparency and help safeguard the financial system against illicit use. They will also include an improved regulatory requirement to identify beneficiaries of legal entities, subject to certain exemptions and enhanced due diligence (EDD) when individuals or groups are identified as qualifying for exemptions. Compliance with these new regulations compels institutions to make more informed, insightful and consistent decisions that strengthen the effectiveness of compliance programs. Implementing these changes can be operationally and technologically burdensome. But noncompliance with AML laws carries a hefty penalty and the fines for violations of AML and CDD may be directed at either senior executives or institutions. In 2012 HSBC agreed to pay a record $1.92 billion in fines to U.S. authorities. And while in 2014 only 45 anti-money laundering (AML) infractions were issued, the penalty costs rose. Banks paid USD351 million in 2014, or roughly 7 times the fines levied in the previous year, excluding concurrent fines with fines being levied on the c-suite as well.
  • 3. IBM Analytics 3 Understanding customer relationships is vital to fighting financial crime Financial crimes can be complex, often spanning national borders. Combatting them involves a range of challenges, including: • Correctly identifying a bank’s “customer”, whether it be an individual or organizations • Understanding hidden patterns and relationships among customers • Covering the cost of investigations and compliance reporting • Reducing false positives to prevent unnecessary investigation of legitimate transactions • Increasing detection speed to limit losses and customers’ exposure To detect suspicious activities, institutions must understand more than just their own customers—they need a clear understanding of their customers’ customers as well. Unfortunately, most financial institutions currently use rule or profile-based engines that are not agile enough to adapt to today’s fraud and AML’s ever-changing schemes. Anticipating that newer tools and processes will be required to keep up with these changes, financial institutions also insist that any technology change must augment—not replace—the significant investments they have already made in fraud and AML systems. The IBM Counter Financial Crimes Management solution helps banks tackle these challenges with a multilayered ecosystem of complementary analytical techniques, including crucial entity analytics capabilities. The solution is designed to complement organizations’ existing investments in anti–financial crimes technology. It helps eliminate information silos, expands the observation space and enables unified enterprise business intelligence. By using a full array of tightly woven big data, entity and predictive analytics capabilities, the solution can analyze data from both internal and external intelligence sources. This allows financial institutions to mix and match the right tools to apply to each unique fraud or financial crime scenario. Entity and relationship analytics help banks understand customers in real time Understanding whether the bank is working with the right person and whether each transaction is legitimate is vital throughout the entire customer lifecycle—from account opening through every deposit, transfer, investment and withdrawal. The Context Computing features within IBM Counter Financial Crimes Management leverage advanced entity analytics specifically optimized to recognize nefarious individuals and organizations in spite of sophisticated attempts to mask their identities, unscrupulous relationships and activities. There are three vital aspects of knowing your customer: 1. Identity resolution (who is who?): By accumulating identity context over time, the entity analytics feature uses various enterprise sources of information to determine whether individuals really are who they say they are. Proprietary IBM Context Computing technology looks at these attributes across time to help ensure the most accurate identity and determines whether a previous assumption should be corrected based on new facts.
  • 4. 4 IBM Counter Financial Crimes Management 2. Relationship resolution (who knows who?): Once accurate identity is established, complex relationships can be uncovered. The system processes resolved identity data to determine whether people are—or ever have been— related in any way. 3. Multilayered analytical processing (who does what?): With “who is who” and “who knows who” well established, the IBM Counter Financial Crimes Management solution then applies additional layers of analytics processing to evaluate all transactional and non-transactional behavior of the entity—and optionally, of associated entities as well—to assess downstream compliance and fraud risks. An enterprise-wide view of each customer across all lines of business and geographies is needed to clearly identify and understand the associated relationships. By establishing this comprehensive view at the start of the customer relationship, financial institutions dramatically reduce opportunities for new account fraud and increase their odds of discovering well-concealed criminal activities. Name resolution is an important—albeit often problematic— part of these processes. There are no consistent standards for names. Some countries mandate standards, but they vary from country to country. Nicknames, transliterations between languages, multiple family names (common in many countries), different orders of names and many other factors make the variations appear very different. In addition, personal and corporate names are often represented differently in diverse onboarding systems, or the people involved may provide conflicting information. Often, this is unintentional and the result of human error (for example, names are mistyped or misspelled), or the same person may have different roles within the same company (beneficiary in one instance, account holder in another). Intentional misrepresentation of identities, however, is typically a sign of fraud. Build entity and relationship awareness In isolation, no single data point is particularly useful in allowing financial institutions to understand customers— but in context, the information begins to create a comprehensive picture. IBM Context Computing technology features look at individual data points much like jigsaw puzzle pieces. By looking for relationships between pieces, entity analytics can take a large data set and begin identifying which pieces may be related, as well as which are connected (see Figure 1). And, additional connections will be established as the bank continues to tap into other data sources from within the corporation along with various external sources and watch lists. As more connections are made over time, the relationships become more apparent and fitting new pieces of data into the overall picture becomes easier. Each element refines the complete view, providing greater clarity and more focused insight.
  • 5. IBM Analytics 5 A holistic solution that incorporates the strength of entity analytics The IBM Counter Financial Crimes Management solution delivers a comprehensive array of analytical and investigative capabilities that work together as a single, integrated solution within a common framework and data model. Identity and relationship disambiguation: To help financial institutions recognize and mitigate the incidence of fraud, deception and collusion, IBM Counter Financial Crimes Management provides identity and relationship disambiguation technology based on context accumulation principles along with complex event processing (see Figure 2). Figure 1. IBM Counter Financial Crimes Management leverages entity and forensic analysis and automated discovery to display unknown relationships for investigation.
  • 6. 6 IBM Counter Financial Crimes Management Figure 2. As data from multiple sources is pieced together over time, the entity analytics engine within IBM Counter Financial Crimes Management creates rich visualizations to show who is who, who knows whom and who’s doing what. ! ! ! ! ! ! ! World-Check ChoicePoint Dun Bradstreet Dow Jones/Factiva LexisNexis Experian Acxiom DataQuick US Office of Foreign Assets Control watch list Potentially exposed person list US Directorate of Defense Trade Controls debarred parties Bank of England list FBI most wanted list Interpol terrorist suspects SAR/STR Employee Customer Vendor ACCT Threat fraud intelligence real-time repository Account opening KYC Filtering software Watch list hits Transactional AML SAR/STR Risk management and governance Case management Pattern analysis Data mining Ontology Drill-down queries ALERT ALERT ALERT ALERT SUBPOENA FOLLOW SEARCH External data Internal information assets Front-lineapplicationsInvestigativetools Watch lists
  • 7. IBM Analytics 7 The solution uses entity-centric learning when comparing new data records against context. Entities comprise multiple data records, each of which contains its own unique attributes. New records are compared to all of the entity’s attributes, even if those attributes were sourced from different records. Continuous learning: Determining an identity involves making assertions based on context and using those insights for downstream analysis. When new information determines that a previous assertion is no longer valid, IBM Counter Financial Crimes Management will automatically correct the assertion and create an audit trail so overseers can track the changes made to each record. Rapid risk scoring: IBM Counter Financial Crimes Management incorporates rapid risk scoring capabilities that help financial institutions perform sanctions screening and reduce false positives by identifying legitimate transactions quickly. Data set mapping: The solution can map internal and external data sets (including unstructured data). These capabilities provide an enhanced understanding of customers and their business relationships while creating a network link graph for further analysis. Historical recall: Fully attributed historical recall enables banks to get context on the sources of information. Each data record comes from a unique source; the system remembers what the original record looked like and where it came from. This capability helps investigators completely understand the analytics and make the results actionable. Customers, relationships and context: Critical for crime prevention With greater insights into customers, relationships and context, financial institutions may gain significant regulatory, operational and technology benefits. More accurate results help reduce regulatory risks. In addition, improvements in the effectiveness and efficiency of anti-fraud and AML initiatives can reduce false positives. Once they achieve clarity into customer behaviors and relationships, financial institutions can leverage predictive analytics technologies to perform more effective risk scoring. Analyzing false positives and negatives enhances predictive analytics and improve risk scoring for future transactions. In this way, IBM Counter Financial Crimes Management with entity analytics enables financial organizations to continually learn and expand their financial crime prevention strategies. Context Computing at work: MoneyGram International By resolving entities and relationships with entity analytics, MoneyGram International managers can better understand who is using the company’s services. This knowledge has helped them prevent more than USD37.7 million in fraudulent transactions, reduce customer fraud complaints by 72 percent and quickly address regulatory requirements. Learn more at ibm.com/software/businesscasestudies/us/ en/corp?synkey=Y423188O11007S71
  • 8. © Copyright IBM Corporation 2015 IBM Analytics Route 100 Somers, NY 10589 Produced in the United States of America June 2015 IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only.Actual performance results may vary depending on specific configurations and operating conditions.THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS”WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. 1 United Nations Office on Drugs and Crime, “Comprehensive Study on Cybercrime,” February 2013, www.unodc.org/documents/organized- crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf 2 United Nations Office on Drugs and Crime, “Money-Laundering and Globalization,” www.unodc.org/unodc/en/money-laundering/ globalization.html 3 Global Financial Integrity, “Illicit Financial Flows from the Developing World: 2003-2012,” December 2014, www.gfintegrity.org/report/2014- global-report-illicit-financial-flows-from-developing-countries-2003-2012 Please Recycle ASW12345-USEN-00 For more information To learn more about IBM Counter Financial Crimes Management solution with entity analytics, please contact your IBM representative or visit: www.smartercounterfraud.com Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing