Attacks/Breaches
1/9/2013
03:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NICE Utilizes Voice Biometrics Technology To Expand Fraud Prevention Suite To Contact Centers

Solution enables businesses to better protect the phone channel from fraudsters

RA'ANANA, ISRAEL, January 9, 2013, NICE Systems (NASDAQ: NICE) today announced the launch of its Contact Center Fraud Prevention solution, which tracks fraud patterns and screens all phone interactions for fraud against a watch list of known fraudsters. The solution brings together NICE Actimize's extensive expertise in fraud with NICE's years of experience in the contact center. The solution can be deployed as a standalone contact center solution or as part of the NICE Actimize enterprise fraud offering.

Organizations can reduce fraud-related losses without creating service hurdles or compromising customer experience by adopting a multi-layered approach, which includes non-intrusive voice biometrics technology, speech and transactional analytics, and real-time capabilities.

Aite Group claims that fraud in the contact center is on the rise and, while many businesses have recognized the need to protect customer data and secure online transactions, the phone channel has become a target for fraud. Datamonitor estimates that 20% of people who are defrauded will leave the institution at which this occurred.

Fraudsters often use social engineering by leveraging information available on social networks, enabling them to manipulate and trick customer service agents who continue to verify caller identity through traditional means.

"Preventing fraud losses and protecting clients' personal information are essential goals for enterprises and contact centers. Unfortunately, most agents do not have tools to help them identify fraudsters, which puts the enterprise and customers at risk," said Donna Fluss, President, DMG Consulting LLC. "Social media represents a goldmine for fraudsters. Almost every person has a digital footprint, which can be mined for nefarious purposes. Every public and private organization needs to equip their agents and other employees with tools and best practices to prevent losses."

NICE's Contact Center Fraud Prevention solution enables businesses to pinpoint fraudulent callers according to their unique voice print by using voice biometrics to automatically cross-reference each call with a suspicious watch list of known fraudsters. The solution also implements NICE Interaction Analytics to identify fraud patterns and social engineering attempts based on speech analytics, emotion detection, talk patterns, and interactions. For example, shouting at the agent or trying to change an address or phone number could be part of a fraudulent behavior pattern, and certain keywords may raise a red flag. Telephony and other contextual data, such as IVR events, caller location and ANI matching, also known as caller ID, are also examined to determine potential fraud.

The NICE solution guides the agents in real time to appropriately handle high-risk interactions, and provides an end-to-end fraud management solution that prioritizes high risk interactions for investigation before transactions are authorized. The solution leverages the industry proven NICE Actimize Risk Case Manager, which is a complete investigation and workflow tool used to open an investigation ticket following identification of a fraud attempt, including playback of suspicious interactions.

By focusing on high-risk interactions, companies can channel their resources more efficiently, thereby reducing their operating costs and cutting their fraud losses. Furthermore, companies can offer better service to legitimate customers by streamlining operations for safe interactions without compromising their early fraud detection and proactive contact with customers.

"The contact center is a prime target for fraudsters and enterprises must be prepared to ensure that this area of their business is as well protected as online transactions. By leveraging our contact center best practices with our fraud prevention practice, we were able to create an end-to-end solution that offers proactive fraud detection, real-time guidance, and integrated fraud case management," said Yochai Rozenblat, president of the NICE Enterprise Group. "We believe that our advanced fraud prevention technology will help businesses boost their reputations, protect their customer base, and significantly reduce fraud losses."

To learn more about NICE's Contact Center Fraud Prevention solution, watch this video clip.

About NICE Systems

NICE (NASDAQ: NICE) is the worldwide leader of software solutions that deliver strategic insights by capturing and analyzing mass quantities of structured and unstructured data in real time from multiple sources, including phone calls, mobile apps, emails, chat, social media, and video. NICE's solutions enable organizations to take the Next-Best-Action to improve customer experience and business results, ensure compliance, fight financial crime, and safeguard people and assets. NICE solutions are used by over 25,000 organizations in more than 150 countries, including over 80 of the Fortune 100 companies. www.nice.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8370
Published: 2015-01-29
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

CVE-2015-0236
Published: 2015-01-29
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

CVE-2015-1043
Published: 2015-01-29
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

CVE-2015-1044
Published: 2015-01-29
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

CVE-2015-1422
Published: 2015-01-29
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.