- Utilizing Post-Transaction Fraud Prevention in a Risk Solution - The focus of this white paper is identifying the important capabilities and techniques a risk operation should consider to look for and clean out fraudulent transactions after the sale is completed. There are three primary types of post-transactional activities: monitoring, link analysis and reporting, which include more specific techniques and capabilities for risk management that are discussed in this document.
This white paper is SPONSORED by:
ACI Worldwide offers fast, flexible online fraud prevention. The ACI ReD Shield® real-time, online fraud prevention service is delivered by expert risk analysts and informed by global intelligence. Rules are tailored to merchant needs and the service is delivered to agreed KPIs.
Offering a neutral, unbiased, source for information related to setting up and maintaining solutions for online payments and fraud prevention.
Utilizing Post-Transaction Fraud Prevention in a Risk Solution
While it is natural for organizations to focus on the payment event when it comes to risk management it is also important to consider the benefits of continuing to monitor risk after the transaction has taken place. Fortunately for the fraudsters, however, the post-transaction activities most merchants do employ today are primarily centered on updating blacklists when fraud and chargebacks occur, but there can be quite a bit of time between the payment and associated chargeback events, allowing fraudsters to continue monetizing compromised card numbers or credentials.
- Type: Prepared Research, White Paper, Discussion Document
- Presented By: David Montague, The Fraud Practice
- Length: 17 pages
- Last Update: September, 2014
- Cost: Free
what to expect
The Utilizing Post-Transaction Fraud Prevention in a Risk Solution white paper discusses several important considerations and techniques that can be applied or supplemented post-transaction. Post-transaction monitoring is a somewhat broad term that can be related to several specific techniques discussed in this white paper, including velocity checks, issuer alerts, link analysis, reporting, risk scoring, data sharing and negative lists. When it comes to repeat fraud, morphing fraud and other types of attacks or high risk patterns, a fraud prevention program can achieve notable uplift when adding post-transaction risk management measures.
There is an important distinction in using these tools with post-transaction capabiliites, allowing organizations to more proactively prevent fraud attacks rather than just contain them. For any organization, it is worth taking the time to consider how the use of post-transaction monitoring and reporting tools could augment and improve current risk management practices and strategies.
Receive a free copy of this white paper by completing the request form below.
Fraud Operational Providers offer a combination of techniques within each of the core three areas of a risk program: operational tools, strategy tools and fraud tools. For most merchants, the easiest way to find post-transaction services in the marketplace is to purchase them as part of a packaged solution from an operational provider.
This session covers what constitutes a fraud solution and categorizes the many types of third party fraud tools. The Tools to Solutions course outlines the common terminology of fraud solutions and describes the capabilities needed to implement a fraud solution.
Please complete the following form and a copy of the white paper will be sent to you within 1 business day.