You are on page 1of 2

ACTIMIZE ENTRUST RSA

Strength
 Effective real-time and non real-time  Can listen to and block transaction in  Provides hosted services and on-
risk scoring engine prevents online real-time, and helps prevent account premises software to help prevent
and real-time payment fraud takeovers and man-in-the-browser account takeover
 Effective at preventing real-time attacks  Supports WFD in a variety of use
and non-real-time cross-channel  Good, flexible rule based system cases
fraud (Web, call center and computes scored based on the  Risk scoring uses the Bayesian
interactive voice response [IVR] weighting assign to the rules predictive model plus a rule engine,
across the enterprise, where  Has real-time alerting – and user and it offers real-time and offline
criminals use multiple channels to applications can integrate with an risk-scoring models
perpetrate their crimes API to IdentityGuard for real-time  Has a good case management tool,
 Web offering is part of an enterprise transaction blocking. overall alerting is also very good –
fraud management platform, so if  Listener can listen to all relevant users get back information as to
integrated, modules can benefit traffic (e.g. user logins, application what caused and constituted the
from common user profiles, shared navigation and transactions) alert
models, rules, policy, and alert and
 Listener software is easy to maintain  Basic link analysis is provided
case management systems and
processes
and operate  Supports “back-coloring” process
 Data mart stores all the web that take new fraud findings and
 It forms strong partnerships with its
application data applies them to historical records
strategic large customers
 Has good prioritization of alerts where fraud may have been missed
 Flexible API’s that enable customers
(low, medium, high), also a clear  Has satisfactory basic reports – daily
to provide and manage the data that
visible association between the alert and real time
they need in their application
and the rule that kick it off.  Easy for users to add their own
 Case management system
 Easy for business users and fraud rules and set thresholds
integrates alerts from non Actimize
external systems
analysts to add their own rules, for  Provides some, and integrates with
example when there is a new type of many, authentication factors
 It makes easy for business users to attack
write their own rules and scenarios  WFD is integrated with RSA’s anti
 Creates profiles of users stored in phishing and anti-malware
 It can work with and ingest multiple user database tables that keep track cyberintelligence service
types of authentication and device of variables associated with user
identification data and protocols  Can monitor any event type, even
activity
customized ones, as long as the user
 Its implementations are relatively  Reporting system is supposed to enterprise feeds RSA the data for
straightforward if users integrate have greatly improved with the fraud scoring
legacy applications through Actimize latest software version, based on
APIs as opposed to having to build a  It has early integrations with mobile
open-source Jasper
data warehouse to support the banking and with call center
 Alert management is now tightly services. It compares activity across
application
integrated with reporting the call center and the web channel
 The Actimize Policy Manager
 Has been proven in mobile banking in batch mode
enables users to manage and deploy
rules for non-Actimize systems that
fraud detection, and it is developing  Easy to implement/install a basic
and implementing other cross- version of the version
may play a large role in online
channel capabilities
banking an online payments  Uses Web services
Caution
 Expert professional post-  Storage requirements are very large  Some users have complained about
implementation services are scarce  Uses a rule-based system, so there model performance degradation
 Implementation is difficult and take are lots of rules to establish and during the past year or more
much longer learn  Model performance can deteriorate
 Difficult to get assistance from
qualified staff when special tuning or
 Difficult to configure complex rules if a fraudster passes the
authentication challenge and the
customization work needs to be  Because it’s so flexible and under
model does not flag the transaction
done user control, you must think hard
as suspect; however, enterprises do
 Implementation require on-site about new rules that are added so
not have to integrate authentication
assistance for several months to that you don’t create overwhelming
with risk scoring
properly fine tune the models and amounts of alerts and/or stored
 Users cannot build their own
scoring engine, and to customize data complex rules
system interface  Reporting system in older versions  Users can sometimes get the wrong
 Complex system, difficult to was based on Business objects and information from U.S technical staff
understand and manage was severely limited; user must that messes up implementations
 Poor reporting functionality upgrade to the software version  Users need to pay extra for a
 Project delays result from rigid data released in 3Q09 for improvement primary account manager and go to
extraction, transformation and  Decrypting encrypted data to parse person
loading processes if the system
requires a data warehouse for
it results in system slowdown, albeit  Users can’t combine and nest
acceptable; this is true for any rules(but can prioritize them)
operation application monitoring encrypted
 Less experience with the specific  Its front-end GUI does not enable
data
needs of other country beside U.K users to correlate all the data they
and U.S are interested in analyzing

You might also like