Digital Security 360

Anti-fraud monitoring for
Transactions with TNP

Installation of software for monitoring and analysis of trade transactions
electronic and mobile
Consulting for the prevention and detection of fraud in real time.
Recording of historical establishment/merchant data, distributions of
products/services in their usual behavior
Consulting for:

  • Preparation of fraud indicator matrices by product/service, dashboards and
    high-level graphs.
  • Creation of appropriate business rules for each company.
  • Detection and management of fraud in local and international payments.

Fraud Prevention, Anti-laundering
of Money and Administration of
Risk

Consulting service for the design of monitoring platforms, aimed at the prevention of money laundering, compliance and operational risk.
Installation of software for the prevention of money laundering through real-time monitoring and predictive (neural) analysis.
Software maintenance through updates.
First level support.
Second level support with the manufacturer.
Staff training.
Consulting for the adoption of new technologies aimed at preventing money laundering.
Operation (execution of commands, interpretation of messages and/or software alerts).
Assistance in backup and recovery of data and/or programs.
Software behavior pattern adjustments.
Adaptation of the software according to the business rules.
Adaptation of alerts and reports generated by business rules.
Consulting for the creation of business rules, dashboards, graphics, reports, customer profile management, workflows.
Installation, consultancy and intonation of approval or rejection of transactions, blocking of accounts and inactivation of users.
Consulting and intonation for the monitoring and detection of external threats and
internal:
  • Unusual customer behavior: Suspected fraud transactions (POS, ATMs, eBanking, etc.)
  • Identity fraud,
  • Money Laundering/Terrorist Financing.
  • Irregular SWIFT transactions
  • Alteration of ledger accounts.
  • Cash Closing (Errors, Schedules, etc.).
  • Improper access to confidential information
  • User privilege elevation detection
  • Liability manipulation.
  • Modification of sensitive data and/or online banking user data.

Encryption, Security Platform
Business and Servers
Key Management

Consulting for the selection of Hardware-based Security (HSM).
Installation and configuration of HW for encryption, encryption and key management (generation, storage, protection), secure storage of PKI certificates.
Training for the users of the tool.
First level support.
Second level support with the manufacturer.
Consulting on best practices in the management of enterprise security and encryption platforms.
Consulting on cryptographic key management and applications.
Key generation, key import and export, key rotation.
Implementation of a virtual key manager to execute key management in remote installations or in cloud infrastructures.
Unification of encryption and access control enforcement across these virtualized and cloud infrastructures.
Definition of security policies and key management. Enabling encryption functionality for sensitive business data, structured or unstructured, residing on a server in the data center (physical, virtual or cloud) or in the distributed enterprise.

Risk and Fraud Management
Internal

Consulting for the design of support platforms for operational risk management and cyber fraud prevention.
Installation of software for risk management and fraud prevention, real-time monitoring and forensic analysis.
Software maintenance through updates.
First level support.
Second level support with the manufacturer.
Training for the users of the tool.
Consulting for the adoption of new technologies aimed at the prevention of cyber fraud and risk management.
Operation (execution of commands, interpretation of messages, incidents, scoring and/or online alerts of the software based on cyber fraud and risk management).
Intonation (“tuning”) of the software.
Assistance in backup and recovery of data and/or programs.
Support for the definition of software behavior patterns.
Development of alerts and reports generated by business rules.
Registration, analysis, detection and control of internal and external fraud at the level of user interaction with applications.
Consulting to manage the correlation of events, behavior patterns and business rules, creation of dashboards, graphs and reports.