Search
Close this search box.

Pindrop® Trace

TRACE TECHNOLOGY

LEVERAGING THE POWER OF GRAPH ANALYTICS TO ANALYZE COMPLEX CONNECTIONS IN THE IVR THROUGH TIME.

60%

Pindrop® Labs estimates that over 60% of account takeovers start with, or include a call into the IVR.

5x

Fraudster calls an institution an average of 5 times before attempting an account takeover attack,

How does it work?

IVR activity is analyzed using a patent pending set of technologies analyzing connections between calls and accounts across time, to provide an accurate assessment of which accounts might be under surveillance by a fraudster, if someone is account mining, or spoofing their number to appear as a legitimate customer. These activities and more AI algorithms create a risk score based on the identity claim or account number. That score can be shared across multiple lines of business or enriched with more account data.

When a call with the same number, voice, device, and behavior contacts an account multiple times this is likely what a genuine customer would look like.

If there are unusual calls I.e. ones without the account holders ANI on file. Then, attempting to access the IVR to check a transaction, the spoofed ANI spoof would be caught by Pindrop. The account our spoofing fraudster is accessing is now under attack, therefore its risk rating increases.

 

Identifying connections between accounts and calls can even be enhanced with other data (*using the same identity claim)

 

Over time the program starts to identify patterns in larger data sets and predictions get more accurate.

How does it work?

IVR activity is analyzed using a patent pending set of technologies analyzing connections between calls and accounts across time, to provide an accurate assessment of which accounts might be under surveillance by a fraudster, if someone is account mining, or spoofing their number to appear as a legitimate customer. These activities and more AI algorithms create a risk score based on the identity claim or account number. That score can be shared across multiple lines of business or enriched with more account data.

When a call with the same number, voice, device, and behavior contacts an account multiple times this is likely what a genuine customer would look like.

WHAT CAN YOU DO WITH ACCOUNT RISK?

What would you be able to do with a list of every customer account targeted by a fraudster over the next two months. How much time, resources, and pain could be saved if every account got a new password, or had to go through a second factor identification? Account risk scores, a feature from Pindrop Protect anti-fraud solution, can help mark and monitor account activity in the IVR, calls into an agent, all to provide an highly accurate account risk score. Fraud teams would be able to flag the highest at-risk accounts for increased step up security to protect the account. Enterprises using Pindrop now have the ability to seamless step up account security only for accounts with high risk scores, while maintaining a smooth experience for genuine customers.

– Use account risk scores to strengthen security for the most at-risk customers.

– Share account risk with other channels such as mobile, online, in-person, or across LOBs.

– Leverage scores to focus precious agent time with increased efficacy

Trace-Graphs03-01-1.png

Why Pindrop

Visualized data snapshot from real IVR with fraud connections appearing in red for demonstrative purposes.

Using artificial intelligence and Trace technology, connections can be analyzed to highlight which accounts are most at-risk, finding attack patterns as far as two months before a takeover is attempted. This provides protection for a customer access point that is often overlooked and underestimated as a target for fraudsters. Through a set of APIs Pindrop can illuminate the most at-risk accounts up to 60 days in advance of account takeover.

Other solutions, whether voice, ANI or behavior based can be limited. They rely on a single factor and are narrowly focused on the call center activity, thus missing the big picture of how fraud is perpetrated across channels. More importantly, other solutions limit themselves to one-to-one relationship between a call and an account and preclude larger and complex multi-level relationships between multiple calls and accounts used by multiple fraudsters operating in tandem. Moreover, other solutions come into the picture while the fraud is taking place or even afterwards; not weeks in advance to help contact centers head the fraudsters off at the pass.

Pindrop’s technology can provide a broader view of the enterprise’s fraud across multiple channels helping to identify fraud that moves between channels. Pindrop is the only provider of graph analytics for the IVR, one of the largest centers for account activity. Connecting this intelligence with your existing data and policies helps make more accurate predictions about risk, and ultimately to catch an increasing number of fraud attempts.

According to Pindrop® Labs 60% of ATO
attacks start with or include a call into an IVR.

RESOURCES & DOWNLOADS

CASE STUDY: Waystar Financial

“Waystar Financial”, one of the largest financial institutions on the planet, was suffering significant losses due to account takeover.

Contact Center Security: Anomaly Detection and Fraud Prevention Best Practices

A collection of tools, research, and other resources built for contact center fraud defense

Fraud Outsmarted Infographic

You can’t outsmart fraudsters if you don’t know how they think and behave.

[WEBINAR] Protecting the IVR

Learn the ways your contact center is being targeted by professional fraudsters and how you can harden contact center operations to attack.

Trace® Datasheet

This new technology powers account risk scoring on the Protect platform to identify the most complicated fraud scams and predict cross-channel fraud up to 60 days before the fraud takes place.