This is the first installment in a three-part series. Stay tuned for parts two and three to learn more.
Innovation is key to successful digital transformation, digital identity trust and, ultimately, business growth. We live in a dynamic environment that benefits from an adaptive security approach to digital identity trust. Many industry experts recommend continuous risk authentication, but also important to your strategy is your security solution provider and its ability to innovate.
The fraud protection and digital identity trust solution provider you choose can impact your success. Fostering an environment of protection and engaged customers is a team event. Trust in your fraud detection provider can build trust with your customers — it runs full circle.
So how do you know which security provider is best for you? How do you know who to trust? Rob Rendell, global client success leader, financial fraud prevention and strategic development at IBM Security, has been hands-on in fraud prevention vendor selection processes for years and has a deep understanding of what can lead to a successful partnership.
How to Maximize Your Fraud Prevention Investment, According to a Digital Trust Expert
Question: In your experience, why do organizations typically seek a new fraud protection vendor?
Rendell: Typically, one of two things sparks a need for a new vendor:
- Fraud losses: Either continual losses (slow bleed) or a major event will cause an organization to look externally to seek a new solution or extension of an existing solution to curve the trend with losses.
- Customer experience optimization for new product or feature expansion: When leadership decides to launch new capabilities for consumers, risk management leaders must perform risk evaluations. In some cases, new features and functionality mean unfavorable risk exposure, which requires risk management teams to leverage technology to mitigate the exposure. They also look to balance risk and customer experience. This combined effort can help establish a digital identity trust approach that can provide customers with the journey they expect.
With growing customer demand for anytime, anywhere access, why is real-time visibility important in a new solution?
Rendell: As the settlement of transactions has moved to real time, risk should also be evaluated in real time. Passive monitoring throughout the user journey can help achieve this continuous viewpoint into user risk. It is also important to mitigate session account takeover attacks, which have become increasingly sophisticated.
Passive monitoring also enhances the user experience by helping to reduce interdiction rates. Historically, organizations used strict business policy rules within user flows. Today, they can use intelligence from passive monitoring and only interdict when there is evidence of risk.
We hear a lot of buzz around machine learning and artificial intelligence (AI) being built into fraud protection solutions. Can you tell us what that means?
Rendell: Pairing machine learning and AI with a continuous security strategy can lead to fraud tools that help enable continuous learning. These models can quickly update based on changing fraud trends. This self-tuning doesn’t rely on data analyst intervention. Such intervention requires lengthy data jockeying and can be costly from an employee funding perspective.
What additional value can a vendor bring to your organization that you can’t otherwise do yourself, and how important is this?
Rendell: Typically, vendors (service suppliers) have a unique perspective, as they have a viewpoint into trends in other geographies, markets and organizations. When it comes to fraud information/intelligence sharing, this is important. Consortium data is a powerful tool to help protect peer organizations from common bad actors, and it provokes peers to share insights as they happen. In this model, everyone has each other’s best interest in mind. Consortium insights provide businesses a global viewpoint that they otherwise might not have access to.
Read the “2018 Digital Identity Trust Survey” to learn more
WW Content Marketing Manager, Trusteer, IBM Security
Fraud Prevention & Cyber Security Strategist, IBM Cloud and Cognitive Software