
Digital Security 360
Anti-fraud monitoring for
Transactions with TNP
Installation of software for monitoring and analysis of trade transactions
electronic and mobile
Consulting for the prevention and detection of fraud in real time.
Recording of historical establishment/merchant data, distributions of
products/services in their usual behavior
Consulting for:
- Preparation of fraud indicator matrices by product/service, dashboards and
high-level graphs. - Creation of appropriate business rules for each company.
- Detection and management of fraud in local and international payments.
Fraud Prevention, Anti-laundering
of Money and Administration of
Risk
Consulting service for the design of monitoring platforms, aimed at the prevention
of money laundering, compliance and operational risk.
Installation of software for the prevention of money laundering through real-time
monitoring and predictive (neural) analysis.
Software maintenance through updates.
First level support.
Second level support with the manufacturer.
Staff training.
Consulting for the adoption of new technologies aimed at preventing money laundering.
Operation (execution of commands, interpretation of messages and/or software
alerts).
Assistance in backup and recovery of data and/or programs.
Software behavior pattern adjustments.
Adaptation of the software according to the business rules.
Adaptation of alerts and reports generated by business rules.
Consulting for the creation of business rules, dashboards, graphics, reports, customer profile management, workflows.
Installation, consultancy and intonation of approval or rejection of transactions, blocking of accounts and inactivation of users.
Consulting and intonation for the monitoring and detection of external threats and
internal:
- Unusual customer behavior: Suspected fraud transactions (POS, ATMs, eBanking, etc.)
- Identity fraud,
- Money Laundering/Terrorist Financing.
- Irregular SWIFT transactions
- Alteration of ledger accounts.
- Cash Closing (Errors, Schedules, etc.).
- Improper access to confidential information
- User privilege elevation detection
- Liability manipulation.
- Modification of sensitive data and/or online banking user data.
Encryption, Security Platform
Business and Servers
Key Management
Consulting for the selection of Hardware-based Security (HSM).
Installation and configuration of HW for encryption, encryption and key management
(generation, storage, protection), secure storage of PKI certificates.
Training for the users of the tool.
First level support.
Second level support with the manufacturer.
Consulting on best practices in the management of enterprise security and encryption
platforms.
Consulting on cryptographic key management and applications.
Key generation, key import and export, key rotation.
Implementation of a virtual key manager to execute key management in remote installations or in cloud infrastructures.
Unification of encryption and access control enforcement across these virtualized and
cloud infrastructures.
Definition of security policies and key management.
Enabling encryption functionality for sensitive business data, structured or unstructured,
residing on a server in the data center (physical, virtual or cloud) or in the distributed
enterprise.
Risk and Fraud Management
Internal
Consulting for the design of support platforms for operational risk management
and cyber fraud prevention.
Installation of software for risk management and fraud prevention, real-time
monitoring and forensic analysis.
Software maintenance through updates.
First level support.
Second level support with the manufacturer.
Training for the users of the tool.
Consulting for the adoption of new technologies aimed at the prevention of
cyber fraud and risk management.
Operation (execution of commands, interpretation of messages, incidents, scoring and/or online alerts of the software based on cyber fraud and risk management).
Intonation (“tuning”) of the software.
Assistance in backup and recovery of data and/or programs.
Support for the definition of software behavior patterns.
Development of alerts and reports generated by business rules.
Registration, analysis, detection and control of internal and external fraud at the
level of user interaction with applications.
Consulting to manage the correlation of events, behavior patterns and business
rules, creation of dashboards, graphs and reports.