Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/19/2010
02:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Keycorp Signs Agreement With Nice Actimize To Prevent Consumer And Business Fraud

Technology to be used to further protect clients, enhance client experience

CLEVELAND, OHIO/NEW YORK, NY, July 19, 2010 - KeyCorp (NYSE: KEY) has signed an agreement with NICE Actimize, a NICE Systems (NASDAQ:NICE) company, to further strengthen its ability to proactively detect and mitigate consumer and commercial fraud. NICE Actimize is a leading provider of financial crime, risk and compliance solutions.

With global fraud costs likely to total more than $300 billion annually, according to a 2009 research study by Gartner , proactive fraud risk management can offer a competitive advantage in today's financial services industry.

Enhancements to Key's existing fraud strategy will include using behavior-based analytics to more quickly identify acceptable transactions while helping to prevent unauthorized activities within KeyCorp's consumer, small business and commercial banking segments. The NICE Actimize technology applies unique algorithms and analytical models for each type of customer - consumer, small businesses and commercial - thus enhancing fraud prevention and an optimal user experience.

The agreement aligns with and supports Key's comprehensive fraud strategy, which includes enabling revenue growth, mitigating risk, and enhancing the client experience.

The relationship KeyCorp has formed with NICE Actimize is significant from a financial standpoint - representing a considerable investment - and also from a product standpoint, as it covers multiple channels and business lines. This cross-channel approach to fighting fraud is becoming increasingly more common as financial institutions move toward developing enterprise-wide fraud prevention strategies versus deploying siloed solutions.

"This exciting relationship with NICE Actimize is an investment in our clients and their financial safety and well-being," said Douglas Twining, director of fraud services for KeyCorp. "While Key's current anti-fraud measures are strong, Key is making a significant investment today so that we are prepared for the changing risks that the future will likely bring."

"We are happy to be working with Key to help them continue to proactively manage fraud threats," said Amir Orad, CEO of NICE Actimize. "Key is joining the NICE Actimize community of leading global firms who use our cross-channel financial crime prevention solutions to improve the customer experience by better managing transactional risks for both retail and commercial customers."

About NICE Actimize

NICE Actimize, a NICE Systems (NASDAQ:NICE) company, is the world's largest and broadest provider of a single financial crime, risk and compliance software platform for the financial services industry. NICE Actimize empowers its clients to prevent financial crime, mitigate risk, reduce operational costs, minimize losses and improve compliance. The company provides real-time and cross-channel fraud prevention, anti-money laundering, enterprise investigations, risk management and trading surveillance solutions built upon the Actimize Core Platform, which has been enhanced by the company's acquisitions of Syfact and Fortent (Searchspace) analytics and technology. With offices across North America, Europe, and Asia, NICE Actimize serves more than 200 clients globally including all of the world's 10 largest financial institutions. www.actimize.com

About KeyCorp

Cleveland-based KeyCorp is one of the nation's largest bank-based financial services companies, with assets of approximately $95 billion. Key companies provide investment management, retail and commercial banking, consumer finance, and investment banking products and services to individuals and companies throughout the United States and, for certain businesses, internationally. For more information, visit https://www.key.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.