"Fraud and Security" Articles

BLOG LISTING LAYOUT

RSA 2019 Recap: Visibility of Threats and What Is Missing

Michael Kaczmarek
by Michael Kaczmarek March 15th, 2019
RSA 2019 Recap: Visibility of Threats and What Is Missing

The focus of RSA 2019 was undoubtedly threat visibility. Every vendor was either demonstrating the depth of their intelligence, how their systems could better identify threats to an organization’s online ecosystem, or how their systems could correlate the threats from all other systems into a single pane of glass. What is missing from all of these systems is an understanding of the people, the places, and the things about what is on the other end of the initiating connection. At Neustar, we call this understanding identity. This combination of identity with traffic and behavior to determine activity, context and intent is what Neustar calls the PredictiveEdge™. Read Full Article

IPv6: Helping You Make the Right Decisions

Steve Hindman
by Steve Hindman February 25th, 2019
IPv6: Helping You Make the Right Decisions

As the deployment of IPv6 has increased, the number of devices and people using IPv6 addresses has also grown. Companies that use IP address information to make decisions about user experience, legal compliance, or risk assessment should consider whether it’s time to incorporate IPv6 geolocation data into their toolset. Neustar's IP GeoPoint IPv6 data provides insight into over 99% of all routable IPv6 addresses. Read Full Article

Forrester Consulting: How Your Peers are Balancing Integrated Identity Verification in the Contact Center

Kelli Skodinski
by Kelli Skodinski February 22nd, 2019
Forrester Consulting: How Your Peers are Balancing Integrated Identity Verification in the Contact Center

Neustar wanted to hear directly from industry leaders regarding their current state of fraud prevention, challenges, and the effectiveness of various account takeover fraud mitigation techniques. As the leader in identity verification, we were curious to dig deep into the offline, online, and device-based identity verification methods firms deploy to tell legitimate customers’ identity from those who are seeking to do harm or falsify intent. So, in October 2018, Neustar commissioned Forrester Consulting to conduct a survey of 204 decision-makers in fraud management, authentication, and customer experience to explore fraud mitigation and consumer friction with integrated IDV. Based on the results from the survey, Forrester reported that businesses that are expanding their integrated IDV and putting their customers are the center of decision making are more coordinated and effective in their authentication strategy overall, compared to other businesses in the survey, allowing them to get more out of each method they use. Read Full Article

Tools Financial Institutions Need to Mitigate Account Takeover & Account Origination Fraud

Adam Russell
by Adam Russell December 14th, 2018
Tools Financial Institutions Need to Mitigate Account Takeover & Account Origination Fraud

Learn how FIs are managing current and future account takeover and account origination fraud threats with a multilayered approach, without friction for legitimate customers. Read Full Article

Reducing Friction and False Positives: How to Let the Good Customers In and Keep the Bad Guys Out

Bob McKay
by Bob McKay November 20th, 2018
Reducing Friction and False Positives: How to Let the Good Customers In and Keep the Bad Guys Out

To protect their bottom line, companies need to protect against fraud. But it’s also important not to decline legitimate transactions from valuable customers or risk losing them to a competitor. Having a robust identity solution is the answer. Read Full Article