Analytics
10/17/2012
01:33 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Experian And Iovation Collaborate To Prevent Fraud With Identity Verification And Device Reputation

Integrated offering will use Experian's Precise IDSM platform

COSTA MESA, Calif., Oct. 11, 2012 /PRNewswire/ -- Experian® today announced that it is working in partnership with iovation, the Device Reputation Authority(TM), to provide a comprehensive suite of identity verification and device reputation services. These services protect businesses and agencies that deliver customer services via both online and mobile access channels from fraudulent transactions, fraud rings or recurring fraud activities.

The two companies will work together globally to fight fraud by using a combination of identity authentication, shared device reputation and real-time risk evaluation. The integrated joint offering will utilize Experian's industry-leading Precise IDSM platform. The platform features risk-based authentication encompassing highly predictive risk assessments through a combination of identity element verification, risk scoring, progressive out-of-wallet questioning and comprehensive decisioning based on a holistic view of an identity in use. This combination helps to refine decisions on which identities should be allowed to enter a system and which should be further verified via alternate processes.

"Experian is committed to security, and by working with iovation we are able to leverage our combined expertise and provide our clients with the technologies to help them prevent fraud and achieve optimal efficiency while minimizing customer friction," said Charles Chung, president of Decision Analytics North America at Experian. "We are excited to be working with an innovative company such as iovation that is on the vanguard of online trust, reputation and fraud prevention technologies."

Working in tandem with Experian's Precise ID platform, iovation's ReputationManager 360 service utilizes the past and current behavior of more than 1 billiondevices to identify and re-recognize devices logging into an organization's Website in real time. This unique approach also exposes relationships among accounts with multiple vendors and identifies all of the devices associated with an individual without needing personally identifiable data. Doing so helps businesses prevent fraudulent transactions before they happen and root out fraud rings or recurring fraud activities -- all while protecting the privacy of consumers.

Experian and iovation have worked together to show U.S. financial institutions how to implement the recent FFIEC Guidance entitled Supplement to Authentication in an Internet Banking Environment, which asks financial institutions to mitigate risk using a variety of processes and technologies employing a multilayered approach. The joint offering from Experian and iovation allowed businesses to meet these requirements and move beyond simple device identification to complex device identification and out-of-wallet identity verification procedures.

"We are thrilled to collaborate with Experian on helping our joint clientsavoid fraud losses by stopping cybercriminals before they damage their business or customers. Combining iovation's power of device reputation with Experian's extensive identity-based services is game-changing," said Jon Karl' co-founder and vice president of corporate development at iovation. "iovation is committed to identifying suspicious activity, exposing the size and scope of problems, and helping our customers know whom to trust online."

About iovation

iovation protects online businesses and their end users against fraud and abuse through an industry-leading combination of shared device reputation and real-time risk evaluation. 2,000 fraud managers around the globe leverage iovation's database of Internet devices and relationships between them to determine the level of risk associated with any type of online transaction.

Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of more than 1 billion devices from every country in the world. Every day, iovation stops over 150,000 fraud attempts. For more information, visit http://www.iovation.com.

About Experian

Experian is the leading global information services company, providing data and analytical tools to clients around the world. The Group helps businesses to manage credit risk, prevent fraud, target marketing offers and automate decision making. Experian also helps individuals to check their credit report and credit score, and protect against identity theft.

Experian plc is listed on the London Stock Exchange (EXPN) and is a constituent of the FTSE 100 index. Total revenue for the year ended March 31, 2012, was $4.5 billion. Experian employs approximately 17,000 people in 44 countries and has its corporate headquarters in Dublin, Ireland, with operational headquarters in Nottingham, UK; California, US; and São Paulo, Brazil.

For more information, visit http://www.experianplc.com.

Experian and the Experian marks used herein are service marks or registered trademarks of Experian Information Solutions, Inc. Other product and company names mentioned herein are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.