August 22, 2019 By Christine DeFazio 3 min read

This is the last installment in a three-part series. Be sure to read part one and part two to catch up on the full story.

Going live with your fraud protection solution should be a strategic process, enabling smooth transitions and positive outcomes. This continuation of your ongoing relationship with your vendor is where you can find ways to help your teams achieve success in the execution of your new solution as well as opportunities for continuous improvement. So, what is involved, and how can you help achieve a secure, seamless customer experience through this partnership?

Rob Rendell, global client success leader, financial fraud prevention and strategic development at IBM Security, has shared his valuable fraud and risk experience with us along this journey, and he’s back with more insight into what vendor involvement should look like to help develop a stable, cross-functional group.

How to Ensure Go-Live Success With Your Fraud Protection Vendor

Question: Once the fraud protection vendor is onboarded and teams are ready for implementation, what are some steps for success? Who should be involved throughout?

Rendell: Cross-functional stakeholder meetings should be established throughout the approval and onboarding life cycle. At the point of implementation, it’s important to have a joint meeting between technology partners from both groups to understand how the solution intends to hook into the target environment. It also helps to map out how the solution will be executed.

To start, ask yourself: Will the solution be leveraged as a standalone tool? The benefit here is speed to production and short-term wins.

In addition, will the solution need to be integrated with a larger risk engine? Many fraud organizations are integrating vendor solutions into larger risk engines to be a supplier of data/intelligence that is then aggregated with other data points to help increase fraud detection rates. Integration with a larger risk engine can also provide operational benefits since fraud analysts aren’t required to work out of multiple systems, reducing time wasted toggling between tools. Consolidated alert management can also improve efficiencies with alert workflow, alert automation (auto-contact strategies), reporting, and ongoing model performance and governance

Next, determine where the data will be stored for analytics reasons. You should also create testing plans to intended solution use cases. Furthermore, individual test scripts should be created and fully executed against. Validate connectivity and data capture with the supplier, and employ a “round-trip” approach to testing the connectivity from the customer to the supplier and back to the customer.

Finally, conduct a pre-go-live solution readiness workshop with the internal stakeholder group and supplier. Functional areas to be addressed include how the solution works and impact to process and people. Help review teams (operations analysts) understand what the solution is there to do so they know how to take action against review items and what the data means to analytics teams.

Question: How do you define what go-live success looks like? Can you provide an example?

Rendell: Successful go-live usually means minimal or no defects from the implementation, no major end user impact, and operations teams able to execute against the technology.

In the space of creating digital identity trust, this means organizations are able to execute authentication policies and inherent risk systems are able to take decisive action against solution recommendations. Downstream end users are passively protected against malicious acts of potential fraud and account takeover.

Question: As the threat landscape and fraudster sophistication evolve and customer digital demands grow, how can teams continue to maintain this success?

Rendell: Feedback, feedback, feedback. I repeat this because too often stakeholders in organizations implement a solution and start to let it run in autopilot. Continuous conversations between customer and supplier are needed to help protect the organization against the latest threat or if the solution has evolved and the organization needs to make updates to capitalize on the latest feature.

This is part of the supplier’s role too. They should understand the customer’s road map and current threats and educate the stakeholder on environmental trends that are happening in the larger ecosystem.

Fraud Protection Is Constantly Evolving

Much like the fraud landscape and digital customer experience, the supplier relationship evolves, and rightfully so. When partnering, your vendor is an extension of your team and should help advocate for the value of your efforts in securing and simplifying the customers’ digital experience.

See how fraud protection and authentication solutions can help your customers more securely and seamlessly interact with your platforms and apps throughout their entire digital journey.

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today