...

Counter fraud management solution provides detection, response, and

by user

on
Category: Documents
71

views

Report

Comments

Transcript

Counter fraud management solution provides detection, response, and
IBM Cloud Architecture Center
Financial fraud analysis
Counter fraud management solution provides detection, response, and
investigation of fraudulent transactions by collecting data from multiple
sources and applying analytical models across various touch points in
the transaction chain.
This solution is based on the Data and Analytics Reference Architecture.
IBM Cloud Architecture Center
1
Runtime flow
1. Enterprise compliance officers customize and
configure the analytical processing system and
deploy analytical models to look for identity theft
and to correlate financial activity.
5. Analytical learning models are created in IBM SPSS
and business rules are applied to auto-classify
outliers, assign risk categories, and hand over to
agents for case management.
2. Data is collected from multiple sources such as
financial transactions, non-financial transactions,
profile transactions, and more.
6. User’s profile data is updated as transactions are
marked suspect and case management applications
are used to track the investigation.
3. Collected data is correlated with other data sources
such as sensor data, partner data within the
ecosystem, and more.
7. Visualization tools are used by compliance and fraud
officers to discover hidden linkages in flagged
transactions. This data is used to update analytical
models for improved future accuracy.
4. All raw data is sent to the data repository (IBM
BigInsights®). Analytical models are deployed to
detect outliers such as profile anomaly detection, link
detection, and more.
IBM Cloud Architecture Center
2
Components
COMPONENT
DEFINITION
PRODUCT
Data sources
Includes different information sources that may
contain data of interest for cyber security such as
NetFlow, DNS, network logs, and more.
Streaming computing
Includes stream processing systems that ingest and
process large volumes of highly dynamic, timesensitive continuous data streams.
InfoSphere® Streams
Data integration
Copies and correlates information from disparate
sources to produce meaningful associations related
to primary business dimensions.
InfoSphere Information Server
Data repositories
Organizes the data stored in the cloud environment
into repositories supplied by the cloud provider.
IBM BigInsights for Apache Hadoop,
InfoSphere for Apache Hadoop
Enterprise user directory
Provides storage for and access to user information
to support authentication, authorization, or profile
data.
IBM Security Directory Server
Actionable insight
Includes SaaS or on-premises applications which are
used to derive information from the data in a
convincing and understandable manner upon which
an organization can take an action.
IBM SPSS family
Enterprise data
Includes metadata about the data and systems of
record for enterprise applications.
InfoSphere Master Data Management
This is one product mapping for this scenario. For other applicable products, see the Data and Analytics Reference Architecture and the
other scenarios that are based on it.
IBM Cloud Architecture Center
3
Business drivers
01
02
03
Reduce vulnerability to fraudulent
transactions and complex fraud
schemes.
Fraud is no longer an “acceptable
cost of doing business”.
Operational losses apply
significant pressure on
profitability.
Customer convenience, trust and
satisfaction drive brand choice
and must be earned on an
ongoing basis.
Requirements
Functional requirements
•
•
•
•
•
The solution must support both structured and
unstructured data sources.
The solution must provide analytics across all data
sources and customer touch points.
Integration with existing case management and other
forensic applications is required.
The solution must use predictive modeling techniques
on “at risk” networks to identify hidden fraud and to
better prioritize “organized fraud”.
The solution must provide a mechanism to reduce
false positives by applying new analytics on top of
flagged transactions.
Non-functional requirements
Security
• Reduce false positives in fraudulent transactions.
Performance
• Reduce time in processing low-risk claims.
For more information and for the latest solutions and other assets, visit developer.ibm.com/architecture
IBM Cloud Architecture Center
© Copyright IBM Corporation 2016
4
Fly UP