Biometrics , Governance & Risk Management , Multi-factor & Risk-based Authentication

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection

IBM Security's Brooke Satti Charles on the Power of These New Capabilities
Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection

As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.

Satti Charles, a Financial Crime Prevention Strategist with IBM Security Trusteer, is enthusiastic about the new behavioral biometric analysis capabilities in Trusteer Pinpoint Detect, which uses patented analytics and machine learning for real-time fraud detection.

"This new behavioral biometric capability leverages cognitive technology that seamlessly analyzes users' mouse gestures, understanding subtle mouse movements, and delivers actionable risk recommendations," Satti Charles says. "And these capabilities help to maximize detection, reduce false positives and optimize strong authentication."

In an interview about IBM Security's new antifraud solution, Satti Charles discusses:

  • How behavioral biometrics differs from traditional biometric solutions;
  • Why cognitive fraud detection is not just artificial intelligence;
  • Potential use cases for detecting and preventing financial fraud.

Brooke Satti Charles is a Financial Crime Prevention Strategist with IBM Security Trusteer. Her primary focus is to highlight IBM's capabilities in fighting cyber-crime. Her career has been focused on research and reporting of cyber-crime, fraud, money laundering, insurance, terrorist financing, conflicts management, enterprise risk assessments and regulatory compliance. Prior to joining IBM, she held a number of roles at Bank of America and John Hancock/Manulife Financial Services. She is an accomplished writer and public speaker with a tremendous understanding of compliance and regulatory issues as well as the financial crime threat landscape.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.