Vendors
日本語

ENACOMM Fraud Control Module

Create a vendor selection project & run comparison reports
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.

Overview

The ENACOMM Fraud Control Module Identifies, Tracks and Acts!

The ENACOMM Fraud Control Module (FCM) is a modular application that directly integrates with the ENACOMM ViA reporting system. The dedicated module implements customizable fraud indicators to identify, report and take definitive actions regarding suspected fraud. FCM is not a fraud prevention tool. It is a powerful way to discover fraud, to learn the latest tricks being used by fraudsters, to electively take action, and to provide the information you need to establish effective countermeasures.

Key Features

FCM IS ALWAYS ACTIVE, ALWAYS LISTENING. The FCM benefits both your fraud and compliance groups. Whether you’re identifying and tracking card holder fraud or suspected money laundering through suspicious funds transfers, the ENACOMM FCM is constantly analyzing all interactions in real-time, reporting suspected fraud, and taking a variety of actions. Overall, the system:

  1. • Evaluates servicing interactions in real-time using the caller’s ANI, IP address, device ID or account number and compares their activity to preset business rules.
  2. • Analyzes historical customer interaction records to identify and record potential fraud.
  3. • Checks existing customer sources and account numbers against white lists, suspected fraud, and confirmed fraud lists to determine how to best treat the customer.
  4. • Tracks and responds to behaviors that waste your company’s resources such as excessive call center transfers, unwarranted IVR use, excessive card entry errors, and excessive use of telephony and IT resources.

Key Benefits

FCM can detect international and spoofed sources which may be attempting brute force attacks or a denial of service attacks. Even if the interactions are nuisance interactions and not fraudulent, they may be costing you thousands of dollars per day in IT, telephony, and IVR costs and should be stopped.

Media

Brochures