Attacks/Breaches
1/9/2013
03:40 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

NICE Utilizes Voice Biometrics Technology To Expand Fraud Prevention Suite To Contact Centers

Solution enables businesses to better protect the phone channel from fraudsters

RA'ANANA, ISRAEL, January 9, 2013, NICE Systems (NASDAQ: NICE) today announced the launch of its Contact Center Fraud Prevention solution, which tracks fraud patterns and screens all phone interactions for fraud against a watch list of known fraudsters. The solution brings together NICE Actimize's extensive expertise in fraud with NICE's years of experience in the contact center. The solution can be deployed as a standalone contact center solution or as part of the NICE Actimize enterprise fraud offering.

Organizations can reduce fraud-related losses without creating service hurdles or compromising customer experience by adopting a multi-layered approach, which includes non-intrusive voice biometrics technology, speech and transactional analytics, and real-time capabilities.

Aite Group claims that fraud in the contact center is on the rise and, while many businesses have recognized the need to protect customer data and secure online transactions, the phone channel has become a target for fraud. Datamonitor estimates that 20% of people who are defrauded will leave the institution at which this occurred.

Fraudsters often use social engineering by leveraging information available on social networks, enabling them to manipulate and trick customer service agents who continue to verify caller identity through traditional means.

"Preventing fraud losses and protecting clients' personal information are essential goals for enterprises and contact centers. Unfortunately, most agents do not have tools to help them identify fraudsters, which puts the enterprise and customers at risk," said Donna Fluss, President, DMG Consulting LLC. "Social media represents a goldmine for fraudsters. Almost every person has a digital footprint, which can be mined for nefarious purposes. Every public and private organization needs to equip their agents and other employees with tools and best practices to prevent losses."

NICE's Contact Center Fraud Prevention solution enables businesses to pinpoint fraudulent callers according to their unique voice print by using voice biometrics to automatically cross-reference each call with a suspicious watch list of known fraudsters. The solution also implements NICE Interaction Analytics to identify fraud patterns and social engineering attempts based on speech analytics, emotion detection, talk patterns, and interactions. For example, shouting at the agent or trying to change an address or phone number could be part of a fraudulent behavior pattern, and certain keywords may raise a red flag. Telephony and other contextual data, such as IVR events, caller location and ANI matching, also known as caller ID, are also examined to determine potential fraud.

The NICE solution guides the agents in real time to appropriately handle high-risk interactions, and provides an end-to-end fraud management solution that prioritizes high risk interactions for investigation before transactions are authorized. The solution leverages the industry proven NICE Actimize Risk Case Manager, which is a complete investigation and workflow tool used to open an investigation ticket following identification of a fraud attempt, including playback of suspicious interactions.

By focusing on high-risk interactions, companies can channel their resources more efficiently, thereby reducing their operating costs and cutting their fraud losses. Furthermore, companies can offer better service to legitimate customers by streamlining operations for safe interactions without compromising their early fraud detection and proactive contact with customers.

"The contact center is a prime target for fraudsters and enterprises must be prepared to ensure that this area of their business is as well protected as online transactions. By leveraging our contact center best practices with our fraud prevention practice, we were able to create an end-to-end solution that offers proactive fraud detection, real-time guidance, and integrated fraud case management," said Yochai Rozenblat, president of the NICE Enterprise Group. "We believe that our advanced fraud prevention technology will help businesses boost their reputations, protect their customer base, and significantly reduce fraud losses."

To learn more about NICE's Contact Center Fraud Prevention solution, watch this video clip.

About NICE Systems

NICE (NASDAQ: NICE) is the worldwide leader of software solutions that deliver strategic insights by capturing and analyzing mass quantities of structured and unstructured data in real time from multiple sources, including phone calls, mobile apps, emails, chat, social media, and video. NICE's solutions enable organizations to take the Next-Best-Action to improve customer experience and business results, ensure compliance, fight financial crime, and safeguard people and assets. NICE solutions are used by over 25,000 organizations in more than 150 countries, including over 80 of the Fortune 100 companies. www.nice.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio