SlideShare a Scribd company logo
1 of 3
Download to read offline
1© iovation Inc.
CASE STUDY
CHALLENGES
•	 Fraudsters applying for
credit using stolen identities
•	 Risky transactions coming
in from various geographies
•	 Difficulty knowing who to
trust online
SOLUTIONS
•	 Leverage device
recognition, device
reputation and set alerts
•	 Use link analysis to tie
related accounts and
devices together
•	 Understand an applicant’s
true location vs. stated
location
RESULTS
•	 Proactive approach stops
bad actors at the front door
•	 Connect and stop Florida
ID theft ring
•	 100% reduction in fraudulent
credit applications
UMB Curtails Consumer
Credit Application Fraud
From a storefront bank in Kansas City, Mo., with first-day deposits of $1,100 in
1913, UMB Financial Corporation has grown to become a diversified financial
services holding company with multi-billion dollar assets. The company has
a long tradition of providing outstanding customer service and its associates
shared mission includes knowing their customers, anticipating their needs
and acting as their advocate. This commitment to service also means
keeping customers safe from cybercriminals with advanced fraud protection
that works behind the scenes and providing a seamless user experience.
“Since we deployed iovation, we have not experienced
fraud losses resulting from a credit card application
flagged by iovation.”
Cristina Koder
Check Fraud Operations Supervisor
Financial institutions are obvious targets for cybercriminals, especially when
they offer consumer credit online. Organized fraud rings are out to make
big profits using stolen or synthetic identities on these application platforms.
UMB was no exception and they knew they needed a strong, multi-layered
strategy to protect their customers and brand reputation.
2© iovation Inc.
Case Study: UMB Curtails Consumer Credit Application Fraud
After evaluating best-in-class fraud prevention solutions used at major financial institutions, UMB
settled on iovation’s device reputation service. This allowed them to tap into the shared knowledge
within iovation’s cybercrime intelligence network of more than 2 billion Internet-enabled devices
(such as laptops, tablets and mobile phones) and 22 million fraud and abuse reports. Knowing that
criminals quickly move from business to business, UMB wanted immediate knowledge of when bad
actors began interacting with their website or banking app.
“The typical abuse that we see attempted over and over, is fraudsters using stolen identities to open
new accounts,” said Koder. “While people continue to try and commit fraud, there’s no question that
iovation is a fantastic tool in stopping them from getting through both the online and mobile application
process. The risk service provided by iovation allows UMB to prevent fraud every single day. That,
in turn, helps keep our customers protected, engaged and satisfied.”
Shared Intelligence to Stop Fraud Rings
UMB uses iovation to uncover cybercriminals working on their own and in fraud rings. Cybercriminals
often band together in organized groups in order to defraud businesses and consumers. By the same
token, iovation’s risk service includes 3,000 global fraud professionals banding together and sharing
intelligence to prevent online fraud from happening on their sites in the first place.
Device reputation is a combination of real-time risk uncovered (such as velocity thresholds exceeded,
a risky profile match, or evasion techniques uncovered) and client-reports of specific types of fraud
and abuse. UMB can choose to look at up to 45 specific types of fraud in the iovation service (such
as credit card fraud, identity theft, and account takeovers). This granular level allows businesses
to consider the type of evidence that is most relevant to their situation or industry. The information
(along with an allow, review or deny response) is returned by iovation within a tenth of a second.
“I find it most helpful to look at the fraud experiences from major financial institutions in the iovation
network. If other financial clients have marked an account, and by association a device, with financial
fraud or identity theft, I weigh that very heavily in my review process,” said Koder.
Identifying Location Anomalies
UMB finds iovation’s Real IP and geolocation features extremely effective in fighting identity theft
within their credit card applications. Real IP tells them where the site visitor is coming from and the
geolocation data offers country, the stated and ‘real’ IP address, latitude and longitude. Transactions
can be flagged appropriately based on the proxy used, or a watch list or block list can easily be set
up through business rules.
“Anomalies are something we always track. An example would be a mismatch between the time zone
and location or browser language and IP address,” said Koder. “Being alerted to anomalies upfront, we
can investigate the legitimacy of the identity. When we uncover that it’s a stolen identity, we contact
the real identity owner and help them get on the right path to mitigate the damage most efficiently.”
GLOBAL HEADQUARTERS
iovation Inc
111 SW 5th Avenue, Suite 3200
Portland, OR 97204 USA
PH	 +1 (503) 224-6010
FX 	 +1 (503) 224-1581
EMAIL 	info@iovation.com
ABOUT IOVATION
iovation protects online businesses and their end users against fraud and abuse,
and identifies trustworthy customers through a combination of advanced device
identification, shared device reputation, device-based authentication and real-
time risk evaluation. More than 3,000 fraud managers representing global retail,
financial services, insurance, social network, gaming and other companies leverage
iovation’s database of more than 2 billion Internet devices and the relationships
between them to determine the level of risk associated with online transactions.
The company’s device reputation database is the world’s largest, used to protect 12
million transactions and stop an average of 200,000 fraudulent activities every day.
The world’s foremost fraud experts share intelligence, cybercrime tips and online
fraud prevention techniques in iovation’s Fraud Force Community, an exclusive virtual
crime-fighting network. For more information, visit www.iovation.com.
UNITED KINGDOM
PH	 +44 (0) 800 058 8731
EMAIL	uk@iovation.com
Case Study: UMB Curtails Consumer Credit Application Fraud
3© iovation Inc.
The value of the Real IP and geolocation feature was underscored for UMB when they were able to
use it to identify and stop a fraud ring operating out of Florida.
“Fraudsters will purchase every piece of personally identifiable information on a victim, including name,
address, birth date, and social security number. It all looks perfect on paper and matches the credit
bureau information exactly,” said Koder. “Those are the most dangerous applications that we see.
We have not experienced fraud losses resulting from a credit card application since we deployed
iovation. Stopping fraud is why I come to work every day. The success we’ve had from using iovation
is very rewarding.”

More Related Content

More from TransUnion

A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 

More from TransUnion (20)

A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 

Recently uploaded

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 

Recently uploaded (20)

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 

UMB Bank Case-Study_Iovation

  • 1. 1© iovation Inc. CASE STUDY CHALLENGES • Fraudsters applying for credit using stolen identities • Risky transactions coming in from various geographies • Difficulty knowing who to trust online SOLUTIONS • Leverage device recognition, device reputation and set alerts • Use link analysis to tie related accounts and devices together • Understand an applicant’s true location vs. stated location RESULTS • Proactive approach stops bad actors at the front door • Connect and stop Florida ID theft ring • 100% reduction in fraudulent credit applications UMB Curtails Consumer Credit Application Fraud From a storefront bank in Kansas City, Mo., with first-day deposits of $1,100 in 1913, UMB Financial Corporation has grown to become a diversified financial services holding company with multi-billion dollar assets. The company has a long tradition of providing outstanding customer service and its associates shared mission includes knowing their customers, anticipating their needs and acting as their advocate. This commitment to service also means keeping customers safe from cybercriminals with advanced fraud protection that works behind the scenes and providing a seamless user experience. “Since we deployed iovation, we have not experienced fraud losses resulting from a credit card application flagged by iovation.” Cristina Koder Check Fraud Operations Supervisor Financial institutions are obvious targets for cybercriminals, especially when they offer consumer credit online. Organized fraud rings are out to make big profits using stolen or synthetic identities on these application platforms. UMB was no exception and they knew they needed a strong, multi-layered strategy to protect their customers and brand reputation.
  • 2. 2© iovation Inc. Case Study: UMB Curtails Consumer Credit Application Fraud After evaluating best-in-class fraud prevention solutions used at major financial institutions, UMB settled on iovation’s device reputation service. This allowed them to tap into the shared knowledge within iovation’s cybercrime intelligence network of more than 2 billion Internet-enabled devices (such as laptops, tablets and mobile phones) and 22 million fraud and abuse reports. Knowing that criminals quickly move from business to business, UMB wanted immediate knowledge of when bad actors began interacting with their website or banking app. “The typical abuse that we see attempted over and over, is fraudsters using stolen identities to open new accounts,” said Koder. “While people continue to try and commit fraud, there’s no question that iovation is a fantastic tool in stopping them from getting through both the online and mobile application process. The risk service provided by iovation allows UMB to prevent fraud every single day. That, in turn, helps keep our customers protected, engaged and satisfied.” Shared Intelligence to Stop Fraud Rings UMB uses iovation to uncover cybercriminals working on their own and in fraud rings. Cybercriminals often band together in organized groups in order to defraud businesses and consumers. By the same token, iovation’s risk service includes 3,000 global fraud professionals banding together and sharing intelligence to prevent online fraud from happening on their sites in the first place. Device reputation is a combination of real-time risk uncovered (such as velocity thresholds exceeded, a risky profile match, or evasion techniques uncovered) and client-reports of specific types of fraud and abuse. UMB can choose to look at up to 45 specific types of fraud in the iovation service (such as credit card fraud, identity theft, and account takeovers). This granular level allows businesses to consider the type of evidence that is most relevant to their situation or industry. The information (along with an allow, review or deny response) is returned by iovation within a tenth of a second. “I find it most helpful to look at the fraud experiences from major financial institutions in the iovation network. If other financial clients have marked an account, and by association a device, with financial fraud or identity theft, I weigh that very heavily in my review process,” said Koder. Identifying Location Anomalies UMB finds iovation’s Real IP and geolocation features extremely effective in fighting identity theft within their credit card applications. Real IP tells them where the site visitor is coming from and the geolocation data offers country, the stated and ‘real’ IP address, latitude and longitude. Transactions can be flagged appropriately based on the proxy used, or a watch list or block list can easily be set up through business rules. “Anomalies are something we always track. An example would be a mismatch between the time zone and location or browser language and IP address,” said Koder. “Being alerted to anomalies upfront, we can investigate the legitimacy of the identity. When we uncover that it’s a stolen identity, we contact the real identity owner and help them get on the right path to mitigate the damage most efficiently.”
  • 3. GLOBAL HEADQUARTERS iovation Inc 111 SW 5th Avenue, Suite 3200 Portland, OR 97204 USA PH +1 (503) 224-6010 FX +1 (503) 224-1581 EMAIL info@iovation.com ABOUT IOVATION iovation protects online businesses and their end users against fraud and abuse, and identifies trustworthy customers through a combination of advanced device identification, shared device reputation, device-based authentication and real- time risk evaluation. More than 3,000 fraud managers representing global retail, financial services, insurance, social network, gaming and other companies leverage iovation’s database of more than 2 billion Internet devices and the relationships between them to determine the level of risk associated with online transactions. The company’s device reputation database is the world’s largest, used to protect 12 million transactions and stop an average of 200,000 fraudulent activities every day. The world’s foremost fraud experts share intelligence, cybercrime tips and online fraud prevention techniques in iovation’s Fraud Force Community, an exclusive virtual crime-fighting network. For more information, visit www.iovation.com. UNITED KINGDOM PH +44 (0) 800 058 8731 EMAIL uk@iovation.com Case Study: UMB Curtails Consumer Credit Application Fraud 3© iovation Inc. The value of the Real IP and geolocation feature was underscored for UMB when they were able to use it to identify and stop a fraud ring operating out of Florida. “Fraudsters will purchase every piece of personally identifiable information on a victim, including name, address, birth date, and social security number. It all looks perfect on paper and matches the credit bureau information exactly,” said Koder. “Those are the most dangerous applications that we see. We have not experienced fraud losses resulting from a credit card application since we deployed iovation. Stopping fraud is why I come to work every day. The success we’ve had from using iovation is very rewarding.”