2. “Looking for peace of mind? Get a Watchdog.”
USER ERRORS
SYSTEM ERRORS
INSIDER FRAUD
CYBER FRAUD
FAT FINGER
DATA ENTRY
LONG WORKING HOURS
NO TRAINING
BAD EMPLOYEE
PERSONAL NEEDS
CORRUPTION
CRIMINALS
HARDWARE FAILURE
INTEGRATION BREACH
EXTREME ENVIRONMENT
UNEXPECTED USE CASE
CORPORATE ESPIONAGE
HACKERS FOR HIRE
CYBER WARS
TERRORISTS
3. A proprietary patent pending technology that monitors
Business Value Data chains in real-time:
Identifying data discrepancies
Detects business process bypasses
Points out data duplication
Mitigates business risks caused by User and System errors, Insider and Cyber fraud.
THE OFFERING
NO patterns • NO false positives • System agnostic • Fully automatic
5. BUSINESS VALUE - ALERTS’ SAMPLE
CUSTOMERS SUPPLIERSEMPLOYEES
OVER BILLING
INVOICE WITHOUT ORDER
TWO SHIPMENTS ONE INVOICE
PAYMENT APPLIED TO WRONG
CUSTOMER
WRONG CUSTOMER BILLED
SHIPMENT, BUT NO INVOICE
CREDIT APPLIED WITHOUT ORDER
CREDIT CARD CHARGED, BUT NO
ORDER
WRONG ITEM SHIPPED
CUSTOMER CHARGED TWICE
DOUBLE PAYROLL
TERMINATED EMPLOYEE
WRONG BANK ACCOUNT
INAPPROPRIATE ALLOWANCE
OVERPAYMENT
DUPLICATE PAYMENT
INVOICE, BUT NO PURCHASE
ORDER
OVERPAYMENT
INAPPROPRIATE PAYMENT
WRONG ITEM SHIPPED
BANK ERROR
BANK ERROR
ACH
ERROR
6. COMPETITORS
Sensitive data theft by insider or cyber
Money theft by insider or cyber
Unintentional data entry error
System error
User access behaviour anomaly
Fraud pattern match
9. Transaction Watchdog™ - a context-aware computing platform is based upon:
1. Value chain modeling of business activities that span multiple systems, channels and
organizations.
2. Discrete correlation engine that links business documents, across organizations to the
value chain they belong to.
3. Real-time validation of data inconsistencies with simple rules.
TECHNOLOGY