Attacks/Breaches
1/9/2013
03:40 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

NICE Utilizes Voice Biometrics Technology To Expand Fraud Prevention Suite To Contact Centers

Solution enables businesses to better protect the phone channel from fraudsters

RA'ANANA, ISRAEL, January 9, 2013, NICE Systems (NASDAQ: NICE) today announced the launch of its Contact Center Fraud Prevention solution, which tracks fraud patterns and screens all phone interactions for fraud against a watch list of known fraudsters. The solution brings together NICE Actimize's extensive expertise in fraud with NICE's years of experience in the contact center. The solution can be deployed as a standalone contact center solution or as part of the NICE Actimize enterprise fraud offering.

Organizations can reduce fraud-related losses without creating service hurdles or compromising customer experience by adopting a multi-layered approach, which includes non-intrusive voice biometrics technology, speech and transactional analytics, and real-time capabilities.

Aite Group claims that fraud in the contact center is on the rise and, while many businesses have recognized the need to protect customer data and secure online transactions, the phone channel has become a target for fraud. Datamonitor estimates that 20% of people who are defrauded will leave the institution at which this occurred.

Fraudsters often use social engineering by leveraging information available on social networks, enabling them to manipulate and trick customer service agents who continue to verify caller identity through traditional means.

"Preventing fraud losses and protecting clients' personal information are essential goals for enterprises and contact centers. Unfortunately, most agents do not have tools to help them identify fraudsters, which puts the enterprise and customers at risk," said Donna Fluss, President, DMG Consulting LLC. "Social media represents a goldmine for fraudsters. Almost every person has a digital footprint, which can be mined for nefarious purposes. Every public and private organization needs to equip their agents and other employees with tools and best practices to prevent losses."

NICE's Contact Center Fraud Prevention solution enables businesses to pinpoint fraudulent callers according to their unique voice print by using voice biometrics to automatically cross-reference each call with a suspicious watch list of known fraudsters. The solution also implements NICE Interaction Analytics to identify fraud patterns and social engineering attempts based on speech analytics, emotion detection, talk patterns, and interactions. For example, shouting at the agent or trying to change an address or phone number could be part of a fraudulent behavior pattern, and certain keywords may raise a red flag. Telephony and other contextual data, such as IVR events, caller location and ANI matching, also known as caller ID, are also examined to determine potential fraud.

The NICE solution guides the agents in real time to appropriately handle high-risk interactions, and provides an end-to-end fraud management solution that prioritizes high risk interactions for investigation before transactions are authorized. The solution leverages the industry proven NICE Actimize Risk Case Manager, which is a complete investigation and workflow tool used to open an investigation ticket following identification of a fraud attempt, including playback of suspicious interactions.

By focusing on high-risk interactions, companies can channel their resources more efficiently, thereby reducing their operating costs and cutting their fraud losses. Furthermore, companies can offer better service to legitimate customers by streamlining operations for safe interactions without compromising their early fraud detection and proactive contact with customers.

"The contact center is a prime target for fraudsters and enterprises must be prepared to ensure that this area of their business is as well protected as online transactions. By leveraging our contact center best practices with our fraud prevention practice, we were able to create an end-to-end solution that offers proactive fraud detection, real-time guidance, and integrated fraud case management," said Yochai Rozenblat, president of the NICE Enterprise Group. "We believe that our advanced fraud prevention technology will help businesses boost their reputations, protect their customer base, and significantly reduce fraud losses."

To learn more about NICE's Contact Center Fraud Prevention solution, watch this video clip.

About NICE Systems

NICE (NASDAQ: NICE) is the worldwide leader of software solutions that deliver strategic insights by capturing and analyzing mass quantities of structured and unstructured data in real time from multiple sources, including phone calls, mobile apps, emails, chat, social media, and video. NICE's solutions enable organizations to take the Next-Best-Action to improve customer experience and business results, ensure compliance, fight financial crime, and safeguard people and assets. NICE solutions are used by over 25,000 organizations in more than 150 countries, including over 80 of the Fortune 100 companies. www.nice.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6278
Published: 2014-09-30
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and m...

CVE-2014-6805
Published: 2014-09-30
The weibo (aka magic.weibo) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6806
Published: 2014-09-30
The Thanodi - Setswana Translator (aka com.thanodi.thanodi) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6807
Published: 2014-09-30
The OLA School (aka com.conduit.app_00f9890a4f0145f2aae9d714e20b273a.app) application 1.2.7.132 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6808
Published: 2014-09-30
The Active 24 (aka com.zentity.app.active24) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.