Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > The global financial industry needs to speed up its fraud detection through analytics
    Technology

    The global financial industry needs to speed up its fraud detection through analytics

    The global financial industry needs to speed up its fraud detection through analytics

    Published by Gbaf News

    Posted on July 2, 2018

    Featured image for article about Technology

    Guy Muller, VP Engineering, RSD

    Fraud and data theft is, unsurprisingly a significant headache for organizations, and particularly so for banks and insurance companies. Since 2005, there have been over 10 billion data records compromised in 8,000 breaches in the USA alone, that’s the equivalent of 1-2 a day.

    While a major positive for many consumers and organizations around the world, the Internet has also created opportunities for fraudsters and data thieves, who work hard to steal from financial institutions. The answer seemingly would be for these organizations to simply put in place measures to spot and stop the fraudsters as they’re attacking. However, that is not always possible

    In 2017 alone, intrusion attempts increased by 45% versus the previous year, and between 2012 and 2016 such attacks rose by 240%. The astronomical growth in these attacks demonstrates not only the need to identify them but to shut them down and stop future cases occurring.

    However, the problem doesn’t just lie in the theft of the data itself, but in what the criminals do with it, namely cloning identities. With access to such large amounts of stolen personal information, fraudsters are able to adopt personas and attempt to carry out illegal transactions, including taking control of bank accounts that aren’t theirs.

    But, in today’s hyper-connected world, consumers demand instant access to their accounts and insurance policies, and those financial institutions that don’t offer it will lose out on valuable revenue, despite the multitude of channels it also creates that thieves can exploit. As a result of what is effectively a series of open doors, it’s difficult to accurately assess the costs associated with these fraudulent activities, though they are known to be extensive.

    It’s therefore imperative that the institutions make use of their full arsenal to fight the fraudsters to protect themselves and their customers. One way of doing this is by using analytics and business intelligence solutions that can help teams to identify activity that doesn’t look right. In organizations that are 100% cloud-based, accessing the data is easier and helps stop the criminals in their tracks. However, given that 70% of Fortune 500 companies, 92 of 100 of the largest banks and all top 10 of the largest insurance organizations rely on legacy mainframe systems, access to data on these systems ideally needs to be just as fast so they can respond to threats quickly. But that’s generally not possible. The reason for this is that, while incredibly powerful and highly secure platforms, mainframes are purposefully built as silos that are not connected with the rest of the IT infrastructure, and mainframe specialists and data scientists don’t speak the same language.

    With the data that’s required to identify these threats stored on the mainframe, the logical option would be for the BI services to be as well, but that is often counterproductive. By extracting the data from the mainframe’s closed architecture, and performing analytics from outside alongside other data sources, BI teams can build more comprehensive and accurate models that give them a true picture of any potential fraudulent activities.

    A solutionis to use technical offeringsthat enablethe transfer ofmission critical data without impactingeither the security or the quality of service of themainframe applications. The latest solutions capture data from any mainframe application and use the SMF logging mechanism to transfer the data to an open system (for example Linux). This data is then made available as a JSON file, a format that can be utilized by any BI solutions.

    This three-stage mechanism ofcapture, transfer, andextraction has many advantages, the most obvious being that, by delivering the data into a service that analyst teams already use, anyone in the fraud team can work with the files to spot and stop the fraudsters. An additional bonus is that, once set up, its maintenance requires only very limitedmainframe skills, a definite advantage because the pool of seasoned professionals of this architecture is getting smaller and smaller as experts retire without new entrants to match. And finally, this type of solution does not generate a mainframe overhead by only capturing and transferring the required data to the BI platforms.

    By having such access available quickly and efficiently, financial institutions have an opportunity to potentially tap into the mainframe at will, meaning they’re much more likely to halt fraudsters in their tracks. With fraud and data access becoming a higher priority amongst consumers, particularly in the context of GDPR coming into effect in Europe, every organization around the world needs to take their data security seriously, and that has to include having fast and secure access to their critical information. Those that fail to do so will not only fall foul of the criminals, but the law courts and their customers too.

    Guy Muller, VP Engineering, RSD

    Fraud and data theft is, unsurprisingly a significant headache for organizations, and particularly so for banks and insurance companies. Since 2005, there have been over 10 billion data records compromised in 8,000 breaches in the USA alone, that’s the equivalent of 1-2 a day.

    While a major positive for many consumers and organizations around the world, the Internet has also created opportunities for fraudsters and data thieves, who work hard to steal from financial institutions. The answer seemingly would be for these organizations to simply put in place measures to spot and stop the fraudsters as they’re attacking. However, that is not always possible

    In 2017 alone, intrusion attempts increased by 45% versus the previous year, and between 2012 and 2016 such attacks rose by 240%. The astronomical growth in these attacks demonstrates not only the need to identify them but to shut them down and stop future cases occurring.

    However, the problem doesn’t just lie in the theft of the data itself, but in what the criminals do with it, namely cloning identities. With access to such large amounts of stolen personal information, fraudsters are able to adopt personas and attempt to carry out illegal transactions, including taking control of bank accounts that aren’t theirs.

    But, in today’s hyper-connected world, consumers demand instant access to their accounts and insurance policies, and those financial institutions that don’t offer it will lose out on valuable revenue, despite the multitude of channels it also creates that thieves can exploit. As a result of what is effectively a series of open doors, it’s difficult to accurately assess the costs associated with these fraudulent activities, though they are known to be extensive.

    It’s therefore imperative that the institutions make use of their full arsenal to fight the fraudsters to protect themselves and their customers. One way of doing this is by using analytics and business intelligence solutions that can help teams to identify activity that doesn’t look right. In organizations that are 100% cloud-based, accessing the data is easier and helps stop the criminals in their tracks. However, given that 70% of Fortune 500 companies, 92 of 100 of the largest banks and all top 10 of the largest insurance organizations rely on legacy mainframe systems, access to data on these systems ideally needs to be just as fast so they can respond to threats quickly. But that’s generally not possible. The reason for this is that, while incredibly powerful and highly secure platforms, mainframes are purposefully built as silos that are not connected with the rest of the IT infrastructure, and mainframe specialists and data scientists don’t speak the same language.

    With the data that’s required to identify these threats stored on the mainframe, the logical option would be for the BI services to be as well, but that is often counterproductive. By extracting the data from the mainframe’s closed architecture, and performing analytics from outside alongside other data sources, BI teams can build more comprehensive and accurate models that give them a true picture of any potential fraudulent activities.

    A solutionis to use technical offeringsthat enablethe transfer ofmission critical data without impactingeither the security or the quality of service of themainframe applications. The latest solutions capture data from any mainframe application and use the SMF logging mechanism to transfer the data to an open system (for example Linux). This data is then made available as a JSON file, a format that can be utilized by any BI solutions.

    This three-stage mechanism ofcapture, transfer, andextraction has many advantages, the most obvious being that, by delivering the data into a service that analyst teams already use, anyone in the fraud team can work with the files to spot and stop the fraudsters. An additional bonus is that, once set up, its maintenance requires only very limitedmainframe skills, a definite advantage because the pool of seasoned professionals of this architecture is getting smaller and smaller as experts retire without new entrants to match. And finally, this type of solution does not generate a mainframe overhead by only capturing and transferring the required data to the BI platforms.

    By having such access available quickly and efficiently, financial institutions have an opportunity to potentially tap into the mainframe at will, meaning they’re much more likely to halt fraudsters in their tracks. With fraud and data access becoming a higher priority amongst consumers, particularly in the context of GDPR coming into effect in Europe, every organization around the world needs to take their data security seriously, and that has to include having fast and secure access to their critical information. Those that fail to do so will not only fall foul of the criminals, but the law courts and their customers too.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology Post10th FinTech Future Convention 2018 Will Commence in Shanghai this October
    Next Technology PostOvercoming the top challenges of back up and recovery to the cloud

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts