Sie sind auf Seite 1von 3

Financial Services

PROTECT YOUR COMPANY AND YOUR CUSTOMERS FROM EXTERNAL AND INTERNAL THREATS

i2 has over 20 years of experience developing products and solutions that have helped financial institutions, commercial entities, law enforcement, defense and government organizations around the world investigate, predict, prevent and disrupt the worlds most sophisticated criminal and terrorist threats.

As businesses and consumers conduct more business using their computers and mobile devices, fraudsters have access to more proprietary company and personal information. Moreover, todays fraudsters use a variety of sophisticated methods to conduct their crimes, hiding critical investigative clues in complex layers of large volumes of transactional data. However, with the right combination of i2 solutions, this data can be quickly organized and analyzed, revealing critical insights that will help you investigate incidents, document the results for law enforcement and disrupt and prevent future attacks.

SAVE TIME WITH AUTOMATED DATA INGESTION AND ORGANIZATION


Connect with and search multiple data sources in seconds Schedule imports to automatically push new data into a central database Automatically enrich, rank and index data as it is imported using pre-determined categories

Use histograms, heat maps and other analytical views to spot spikes and trends in financial and account data

TURN VOLUMES OF DATA INTO INSIGHTFUL PATTERNS AND TRENDS


Drill down, look for patterns and make predictive analysis by querying the entire data set Discover geographic and timeline trends with geo-spatial and histogram features Identify gate keepers and key players in target networks with social network analysis tools
Analyze network and email transactional activity to uncover insider threats

PA RT O F T H E I N T E L L I G E N C E - L E D O P E R AT I O N S P L AT F O R M

Financial Services
i2s products and solutions will help you disrupt external attacks, uncover insider threats and adhere to government compliance regulations.
External Fraud
While a criminal or terrorist group can commit fraud within minutes, the investigation can be lengthy and time consuming if the analysts are not using the right technology. i2s products and solutions will help you: Pool data from multiple sources to find entities, links and patterns to detect singular and crosschannel fraud Detect and quickly dissect attacks on your network with robust analysis features and capabilities Improve your operations and policies by leveraging results from investigations

Compliance
Without global due diligence and continuous monitoring, financial institutions can be complicit in aiding the finance of criminal and terrorist enterprises without being aware of it, and can pay a heavy price, from fines or potential jail time to the cessation of operations. i2s products and solutions will help you: Monitor suspicious activity across channels by setting automated alerts on transactions that meet specific criteria Access open source data to create intelligence on domestic and international entities Generate visual charts to share information and insights with other institutions and government compliance organizations Ensure efficient resolution by using the same tools as law enforcement agencies around the globe

Insider Threats
Whether in the form of an unknowing employee whose computer has been compromised, an employee working alone or one who is conspiring with criminals, insider threats present a significant potential loss to financial institutions. i2s products and solutions will help you: Analyze the network activity and access logs associated with suspect accounts to determine potential players who are compromising sensitive information Identify suspicious patterns in email, telecommunications or account activity by filtering and linking data and entities Apply a variety of analytical views to suspicious data to turn leads into actionable intelligence Leverage Human Resource data and open source intelligence in your investigations to create a more robust understanding of the entities involved

"By integrating i2s products with our fraud detection solution, Hunter, fraud investigators are able to visualize complex rings of connected applications to identify organized fraudulent activity."
Map all elements of global and domestic fraud networks including transaction, telephonic, IP, email and geo-spatial data for concise understanding of bad actors, their activities, locations and relationships

Nick Mothershaw, Director of Identity and Fraud Solutions, Experian

Proven Financial Services From a Trusted Partner


Harnessing over 20 years of experience, insights from a global community of users and strategic partnerships, i2 enables you to detect and disrupt the next -generation of fraud, theft and information security challenges.

With over 350,000 users around the globe, i2 customers have access to critical information and best practices from global customers, governments, law enforcement agencies and advanced think tanks through annual events and weekly webinars. In addition, we foster strategic partnerships with industry experts, such as Seneca College Financial Center of Excellence, FINTRAC and NCFTA to ensure our solutions will help you stay ahead of tomorrows challenges. i2 solutions are used by 8 of the top 10 retail banks world-wide 10 of the top 15 top retailers world-wide 200 of the top 200 law enforcement agencies world-wide 18 of the top 20 national security agencies world-wide 30 of the top 35 defense organizations world-wide

Rapidly drill down through complex transactional layers that are used to disguise money laundering schemes

Upon using i2 products, we revealed far more useful intelligence that allowed us to not only detect more fraud, but more importantly, we were able to stop it.
Raphael Lawson, Head of Fraud Investigation Unit, Card Protection Plan

Geo-spatial capabilities map fraudulent activity at ATM and POS locations, or any physical location data, that involves financial transactions

For more information see: www.i2group.com


www.i2group.com i2, the i2 logo, COPLINK and Analysts Notebook are registered trademarks of i2 Limited. Copyright i2 Limited 2011. All rights reserved.

BRO_FINANCE_AM_04052011_Low

Das könnte Ihnen auch gefallen