Attacks/Breaches

5/5/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CA Technologies Releases Payment Security Solution to Cut Online Fraud Loss

CA Applies Real-Time Behavioral Analytics and Machine Learning to Online Transaction Data to Stop Fraud

NEW YORK – CA Technologies today announced CA Risk Analytics Network, the payment industry’s only card-issuer network that stops card-not-present fraud instantly for network members using real-time behavior analytics, machine learning, and global transaction data to reduce online fraud losses by an average of 25 percent* – a potential of $2.2 billion in savings.**

As a cloud-based service, CA Risk Analytics Network incorporates a new advanced neural network model, backed by real-time machine learning, to protect 3-D Secure card-not-present (CNP) transactions. It learns from and adapts to, suspected fraudulent transactions in an average of five milliseconds, instantly closing the gap for potential fraud using the same card or device across all members of the network.

According to Javelin’s 2017 Identity Fraud Report, explosive growth in card-not-present fraud, driven by the increasing e-commerce and m-commerce volume, as well as the EMV liability shift, contributed to the rise of existing card fraud. "Just as e-commerce is displacing point-of-sale transactions, the same is true for the channels in which fraudsters choose to conduct their business. Among consumers, there was a 42 percent increase in those who had their cards misused in a CNP transaction in 2016, compared to 2015 levels," the report showed.

"Detecting anomalies quickly and ensuring frictionless authentication are the first steps in preventing card-not-present fraud without impacting legitimate cardholder transactions," said Terrence Clark, general manager for CA Technologies Payment Security solutions. "Our data scientists have applied advanced analytics and new, real-time, machine-learning algorithms to the global pool of 3-D Secure, e-commerce transaction data and device insights maintained by the CA Payment Security Suite. This provides faster and more accurate online fraud detection and prevention, reducing fraud losses for network members while streamlining online shopping experiences for consumers."

CA’s payment security solutions protect billions of online transactions supporting hundreds of millions of cards and thousands of card portfolios worldwide. CA Risk Analytics Network is open to card issuers with portfolios of any size: from global banks with millions of cardholders, to smaller, or regional financial institutions.

Support for 3-D Secure protocols today and in the future

CA Risk Analytics Network and the CA Payment Security Suite support the 3-D Secure specification today and will support the new EMV 3-D Secure 2.0 specification, which addresses authentication and security for card-not-present, e-commerce transactions using smartphones, mobile apps, digital wallets and other forms of digital payment. The 2.0 protocol will make extensive use of device data, giving CA Risk Analytics Network subscribers a growing new source of information to reduce fraud and optimize the customer experience across all consumer shopping devices and all versions of the 3-D Secure protocol.  Support for both the 1.0 and 2.0 specifications is important as adoption rates of the updated specification among card issuers and merchants will vary.

Resources

*Data based on applying the new CA Risk Analytics Network fraud model to historical customer data over a 90-day period.

** Potential savings based on existing-card account fraud of $8.8 billion in 2016, reported in "2017 Identity Fraud: Securing the Connected Life," a Javelin Strategy & Research survey conducted among 5,028 U.S. adults over age 18.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18913
PUBLISHED: 2019-03-21
Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location with...
CVE-2018-20031
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2018-20032
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon t...
CVE-2018-20034
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2019-3855
PUBLISHED: 2019-03-21
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.