A Practical Guide to Anomaly Detection: How account holder behavior can be the best indicator of account takeover and fraudulent transactions.
Page 5 of the FFIEC Guidance Supplement released on June 28, 2011 states that financial institutions need to "detect and response to suspicious activity." More specifically, new layered security controls "should include processes designed to detect anomalies and effectively respond to suspicious or anomalous activity." This is commonly referred to as anomaly detection.
But what is anomaly detection and
how does it work?
What are the different types of anomaly detection solutions?
Is it hard to implement?
Is it truly effective?
This paper provides actionable information that will help financial institutions understand what anomaly detection is, the importance of analyzing behavior, and why these solutions are so effective.
Presented in a Q&A format, it includes:
- A primer on fraud threats that were the basis for the FFIEC Supplement
- Anomaly Detection Basics: How it works and what it looks for to identify suspicious activity
- How anomaly detection recognizes current and future threats
- Practical implications of deploying and operationalizing anomaly detection, such as how much time does it take each day to review alerts
- Responding to suspicious activity: Actions taken by in-house staff and how they're received by account holders
- ROI of anomaly detection
To download this white paper, please complete the registration form below and click Submit.
We value your privacy. We will not share your email address with any other party or mailing list. You can remove yourself at any time by sending an email to email@example.com.