SlideShare a Scribd company logo
WEBINAR
CREATING A WINNING PLAYER EXPERIENCE WHILE
BATTLING ONLINE FRAUD
DECEMBER 2016
Eddie Glenn
Product Marketing Manager, Fraud Platform & Mobile
Tommy Lieberman
Product Manager, User Experience
2
EDDIE GLENN
P R O D U C T M A R K E T I N G M A N A G E R , F R A U D P R E V E N T I O N
TOM M Y L I EBER M AN
P R O D U C T M A N A G E R , U S E R E X P E R I E N C E
3
USER EXPERIENCE MATTERS.
IT SELLS.
IT BUILDS LOYALTY.
AGENDA
4
n BALANCING
FRAUD PREVENTION, SECURITY,
USER EXPERIENCE
n DEVICE INTELLIGENCE
n DYNAMIC AUTHENTICATION
n MACHINE LEARNING FOR
PREDICTING RISK AND TRUST
n CLOSING REMARKS
5
ONLINE SECURITYONLINE FRAUD
Credit card fraud
Affiliate fraud
Arbitrage
Bonus abuse
Stolen identity
Account take over
Breached credentials
Spoofing
Unauthorized access
Replay attack
YOUR CUSTOMER
6
WHAT’S YOUR
USER EXPERIENCE LIKE?
ACCOUNT CREATION
Probably already pretty
low-friction
But other than email, you
likely know very little about
them
Do you assume new players
are bots, potential
fraudsters, or your best new
customer?
7
WHAT’S YOUR
USER EXPERIENCE LIKE?
LOGIN
How complex are your
password requirements?
Do you offer a
password-less option?
What happens if a password
is forgotten?
How do you protect against
unauthorized logins?
How do you reward your
best customers?
8
WHAT’S YOUR
USER EXPERIENCE LIKE?
DEPOSITS, WITHDRAWALS,
PURCHASES
Do you require additional
verification or authentication?
If so, what kind?
Do you place limits/restrictions on
new players?
What’s your process for dealing
with high-risk players?
How do you reward your best
players?
9
COMPETING NEEDS
• Less user friction overall
• Better customer experiences
• More immediate access
• Build brand loyalty
• Ensure more time spent on
the site
PRODUCT & APP OWNERS
• Reduce attack surface
• Manage and minimize risk
• Stop fraud & cheating
• Leverage existing
capabilities, infrastructure
• Real-time threat indicators
SECURITY & FRAUD TEAMS
10
3 WAYS TO IMPROVE CUSTOMER EXPERIENCE
WHILE PROTECTING YOU & YOUR CUSTOMER
FRICTIONLESS
FRAUD
PREVENTION
CUSTOMER
AUTHENTICATION
PREDICTIVE
TRANSACTION
INSIGHT
DEVICE
INTELLIGENCE
12
Your
customer
63%
world’s population
with mobile 2015
75%(est)
world’s population
with mobile 2020
www.gsma.com/mobileeconomy/
13
DEVICE INTELLIGENCE
DEVICEINTELLIGENCE
DEVICE LOCATION
DEVICE BEHAVIOR
DEVICE RISKS
DEVICE HISTORY
DEVICE REPUTATION
OPERATOR’SBI
USER IDENTITY
USER BEHAVIOR
USER HISTORY
USER PAYMENT INFO
This separation is useful for:
n Privacy compliance
n Incidents of breached
credentials or stolen identity
n Fraud prevention
collaboration across
industries while obfuscating
user identity
n Secondary protection for
self-exclusion
A S E P A R A T E D L A Y E R O F C U S T O M E R I N T E L L I G E N C E
14
DEVICE INTELLIGENCE
Hundreds of attributes
collected
‘Fingerprint’ compared to
billions of previously
collected fingerprints
Frictionless to end user
‘Fingerprint’ collected in
real-time
Device risk indicators
Associations to other
devices, accounts, fraud
A DIGITAL FINGERPRINT OF THE DEVICES THAT CONNECT
TO YOUR WEB AND MOBILE APPS
15
ADDRESSING FRAUD PREVENTION, SECURITY & USER
EXPERIENCE
Is device authorized
for this account?
Where is device
located?
Does device have a
history of fraud?
Is this a trusted or risky
transaction?
How many accounts
has device accessed?
Is device hiding from
detection or exhibiting
other risks?
FRICTIONLESS. INVISIBLE TO USER. SAFE. RELIABLE.
16
WHAT DEVICE INTELLIGENCE IS NOT
Does not use personal
identifying information
Does not tie a device to a
named individual
Does not prevent winners
from winning more
Does not track a user’s
browsing history
Does not track gaming
behavior or wins/losses
Does not encourage
losers to spend more
17
Your view
ADVANCED DEVICE
INTELLIGENCE
n iovation knows related
devices and accounts
Fraud
Report
n If fraud is detected &
confirmed, evidence is placed
on the account
n Related devices and accounts
become associated with the
fraud stopping additional
fraud attempts
DEVICE ASSOCIATIONS DO NOT REQUIRE PII
18
iovation’s view
Your view
n iovation links devices between
subscribers and even different
industries
Fraud
Report
n If another iovation subscriber
confirms fraud on their
account…
PERSISTENT DEVICE IDENTIFICATION & ASSOCIATIONS STOP
FRAUDSTERS AS THEY MOVE BETWEEN BUSINESSES AND INDUSTRIES
ADVANCED DEVICE
INTELLIGENCE
19
iovation’s view
Your view
n Then you can use this to deny
transactions on accounts that
are accessed by the
fraudulent device Fraud
Report
THIS STOPS KNOWN FRAUDULENT DEVICES EVEN IF YOU
HAVE NEVER SEEN THEM BEFORE
ADVANCED DEVICE
INTELLIGENCE
STOPPING
FRAUDSTERS &
CHEATERS
WITHOUT ADDING FRICTION FOR
LEGITIMATE PLAYERS
21
D E V I C E I N T E L L I G E N C E C A N S T O P G A M B L I N G / G A M I N G F R A U D
D E V I C E R I S K S A N D D E V I C E B E H A V I O R R I S K S
Evasive behavior
Inaccurate geo-location
Emulator, virtual machine
Jailbroken, rooted
Used for multiple accounts
High # of transactions
Associated with past fraud
Past self-exclusion
Without added friction for your legitimate players
22
Exposing online gambling fraud.
Threats are higher in gambling than anywhere else online.
BONUS ABUSE
CHIP DUMPING COLLUSION
ALL-IN-ABUSE
ARBITRAGE BETTING SELF-EXCLUSION
23
Catch players involved in fraud schemes.
We reveal multiple devices accessing one or more accounts
and one device accessing multiple accounts.
Account 1
Account 2
Account 3
Account 4
PLAYER
AUTHENTICATION
ADVANCED ACCOUNT SECURITY WITH
MINIMAL USER FRICTION
25
Is this your
player’s login
experience?
Your users want a delightful
experience…
…but with the assurance their
account is secure
Device-based authentication provides advanced security you need
without the hassle for your players
26
DEVICE BASED AUTHENTICATION
F R I C T I O N L E S S , C O N T E X T U A L A N D A D A P T I V E D E V I C E - B A S E D A U T H E N T I C A T I O N
FRICTIONLESS CONTEXTUAL ADAPTIVE
Transparent
authentication
Patented device
recognition
Machine learning
adapts to normal
changes and
deviations
Assess the risk
and context of
every session
React in real-time
to anomalies
Understand
device reputation
and associations
Dynamic
authentication
decisioning
Respond to
different degrees
of risk
Drive step-up or
other actions
DEVICE ID
GEO / IP
INTEGRITY
CONTEXT
REPUTATION
Match
Low
Change
High
Change
27
MULTIFACTOR AUTHENTICATION
B E T T E R U S E R E X P E R I E N C E E V E N F O R H I G H R I S K T R A N S A C T I O N S
Drive all authentication
through one mobile experience,
with configurable options
Single-party or
multi-party real time swipe
authorization
Geo-fencing and time-
fencing constraints create
secure login zones
Proximity - Requires a preset
Bluetooth device to be nearby
Fingerprint - Biometric scans
using customer’s mobile device
Circle Code - Graphic pattern
uses customer’s mobile device
PIN Codes - Authenticate
using user-defined PIN codes
BUILDING
BRAND LOYALTY
WITH PREDICTIVE TRANSACTION INSIGHT
29
FRICTIONLESS USER EXPERIENCE
WITH TRANSPARENT FRAUD PREVENTION & AUTHENTICATION
REWARD GOOD CUSTOMERS
Build brand loyalty
Grow revenue
Grow market share
30
Building Brand Loyalty
Accelerate
VIP status
offers
Offer
bonus chips
Accelerate
deposit limit
increases
Less
cumbersome
deposit
procedures
while minimizing your risk
31
Machine learning with device intelligence
data can predict transaction outcomes:
• Highly risky (likely to be fraudulent)
• Highly trustworthy
23B
online
transactions
Millions of
combinations
analyzed
30M
confirmed
fraud reports
3B
known
devices
32
Predictive
Transaction
Insight
Device Behavior & Attributes
Device transaction velocity
Evasive, rooted/jailbroken,
other risk indicators
Associated with past fraud?
Account Behavior
Account transaction velocity
Associated with past fraud?
Demographic
City, ISP, geolocation
Patterns of geo-location
attributes
Mismatch of location
indicators
Subscriber
Subscriber and transaction
timezone patterns
CLOSING REMARKS
34
USING DEVICE INTELLIGENCE TO IMPROVE END TO END USER EXPERIENCE
Learn more about the user
without adding friction
Offer trustworthy users
incentives to create an
account and play
Keep out devices that are
risky or associated with
past fraud.
NEW ACCOUNT
CREATION
Eliminate need for
passwords while
protecting against account
take over
Offer trustworthy users
incentives to play more
LOGIN
Offer easier & convenient
payment options for
trustworthy customers
Identify high-risk customers
without adding friction to
good customers
Offer low-friction multi-
factor authentication to
protect the account
DEPOSITS,
WITHDRAWALS,
PURCHASES
35
ONLINE SECURITYONLINE FRAUD
Credit card fraud
Affiliate fraud
Arbitrage
Bonus abuse
Stolen identity
Account take over
Breached credentials
Spoofing
Unauthorized access
Replay attack
YOUR CUSTOMER
THANK YOU!

More Related Content

PDF
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
PDF
The Consumerization of Authentication with iovation
PPTX
Lunch and Learn: Fraud Trends in Financial Services
PDF
The State of End-User Security—Global Data from 30,000+ Websites
PPTX
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
PPTX
2019 iovation Gambling Industry Report Highlights
PPTX
Authentifusion: Clarifying the Future of User Authentication
PDF
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Consumerization of Authentication with iovation
Lunch and Learn: Fraud Trends in Financial Services
The State of End-User Security—Global Data from 30,000+ Websites
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
2019 iovation Gambling Industry Report Highlights
Authentifusion: Clarifying the Future of User Authentication
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure

What's hot (20)

PDF
Mobile security mobile malware countermeasure academic csirt
PPTX
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
PDF
Biometrics & AI (Artificial Intelligence) is the future of Authentication
PDF
Biometrics Accuracy - Realities and Fallacies
PDF
Cybersecurity for Banking & Payments Systems
PPTX
Mobilized Secure Login - motionQR Use Case
PDF
Biometrics - Future of Authentication
PDF
Easy Solutions Product Brochure
PPTX
Mobile changes everything, no one is safe
PDF
iFalcon Face Control Mobile
PPTX
Lunch and Learn: Recognising the Good Guys
PPTX
Achieving Strong Customer Authentication Without Losing the Customer
PPTX
2020 i gaming report webinar
PPTX
Has THAT device been involved in past fraud?
PDF
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
PDF
PHISHING PROTECTION
PDF
SmartGo
PDF
Report on ios piracy
PPTX
The Case of the Mistaken Malware
PPTX
The Case of the Stockpiled Credit Cards
Mobile security mobile malware countermeasure academic csirt
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics Accuracy - Realities and Fallacies
Cybersecurity for Banking & Payments Systems
Mobilized Secure Login - motionQR Use Case
Biometrics - Future of Authentication
Easy Solutions Product Brochure
Mobile changes everything, no one is safe
iFalcon Face Control Mobile
Lunch and Learn: Recognising the Good Guys
Achieving Strong Customer Authentication Without Losing the Customer
2020 i gaming report webinar
Has THAT device been involved in past fraud?
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
PHISHING PROTECTION
SmartGo
Report on ios piracy
The Case of the Mistaken Malware
The Case of the Stockpiled Credit Cards
Ad

Viewers also liked (9)

PDF
Protecting Digital Cash on the Move - Stories from the Field​
PDF
Balancing Fraud & Customer Experience in a Mobile World
PDF
How Your Customer Thinks About Payments Fraud
PPTX
Callcredit's Fraud Summit - Customer experience stream
PDF
The Digital Battleground - Protecting the Customer Experience in the midst of...
PPTX
Online fraud in the Digital Gift Card Space
PPT
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
PPTX
Fraud in the Banking Sector
PPT
Presentation on fraud prevention, detection & control
Protecting Digital Cash on the Move - Stories from the Field​
Balancing Fraud & Customer Experience in a Mobile World
How Your Customer Thinks About Payments Fraud
Callcredit's Fraud Summit - Customer experience stream
The Digital Battleground - Protecting the Customer Experience in the midst of...
Online fraud in the Digital Gift Card Space
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Fraud in the Banking Sector
Presentation on fraud prevention, detection & control
Ad

Similar to Creating a Winning Experience While Battling Online Fraud (20)

PPTX
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
PDF
Securing 3-Mode Mobile Banking
PDF
Balancing Security and Customer Experience
PPTX
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
PDF
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
PDF
Security and Compliance
PPTX
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
PPTX
Authentifusion: Clarifying the Future of Customer Authentication
PPTX
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
PPTX
When Customers Win: 
OmniChannel Authentication 
PDF
The When, Why and How of Mobile Fraud Prevention
PPTX
Reduce Friction and Risk with Device Authentication
PPTX
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
PPTX
Outside the Office: Mobile Security
PPTX
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
PPTX
Authentifusion: Clarifying the Future of User Authentication
PPTX
Mobile Security Strategies to Grow Your Business
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
PPTX
Mobile Application Security
PPTX
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Securing 3-Mode Mobile Banking
Balancing Security and Customer Experience
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
[Webinar] Does that device smell fishy? Why device risk is an essential eleme...
Security and Compliance
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Authentifusion: Clarifying the Future of Customer Authentication
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: 
OmniChannel Authentication 
The When, Why and How of Mobile Fraud Prevention
Reduce Friction and Risk with Device Authentication
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
Outside the Office: Mobile Security
Critical Insight: How Device Risk Delivers Dynamic MFACharlotte 20
Authentifusion: Clarifying the Future of User Authentication
Mobile Security Strategies to Grow Your Business
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile Application Security
Working at the Margins: Change Agents in the Converged World (Gartner Report ...

More from TransUnion (18)

PPTX
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
PPTX
A New Imperative: Global Privacy and Data Strategies
PPTX
The Business Imperative for Identity, Trust and Data Stewardship
PPTX
Financial services report webinar v4
PPTX
Webinar: Roll Out the VIP Path to Play
PPT
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PPT
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
PPTX
How Confused.com and iovation Fight Ghost Broking
PPTX
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
PDF
The Insurance Digital Revolution Has a Fraud Problem
PPTX
PSD2: The Advent of the New Payments Market in Europe
PPTX
How E-Commerce Providers Can Remove ATO from Their Carts
PPTX
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
PPTX
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
PPTX
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
PDF
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
PPTX
Achieving both GDPR Compliance and a Positive Customer Experience
PPTX
Webinar Slides: 2018 iovation Gambling Industry Report
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
A New Imperative: Global Privacy and Data Strategies
The Business Imperative for Identity, Trust and Data Stewardship
Financial services report webinar v4
Webinar: Roll Out the VIP Path to Play
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
How Confused.com and iovation Fight Ghost Broking
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
The Insurance Digital Revolution Has a Fraud Problem
PSD2: The Advent of the New Payments Market in Europe
How E-Commerce Providers Can Remove ATO from Their Carts
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
Achieving both GDPR Compliance and a Positive Customer Experience
Webinar Slides: 2018 iovation Gambling Industry Report

Recently uploaded (20)

PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Digital Strategies for Manufacturing Companies
PPTX
history of c programming in notes for students .pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
System and Network Administraation Chapter 3
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
L1 - Introduction to python Backend.pptx
PDF
System and Network Administration Chapter 2
PDF
Digital Systems & Binary Numbers (comprehensive )
Computer Software and OS of computer science of grade 11.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
ai tools demonstartion for schools and inter college
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Digital Strategies for Manufacturing Companies
history of c programming in notes for students .pptx
PTS Company Brochure 2025 (1).pdf.......
2025 Textile ERP Trends: SAP, Odoo & Oracle
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
System and Network Administraation Chapter 3
Softaken Excel to vCard Converter Software.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
L1 - Introduction to python Backend.pptx
System and Network Administration Chapter 2
Digital Systems & Binary Numbers (comprehensive )

Creating a Winning Experience While Battling Online Fraud

  • 1. WEBINAR CREATING A WINNING PLAYER EXPERIENCE WHILE BATTLING ONLINE FRAUD DECEMBER 2016 Eddie Glenn Product Marketing Manager, Fraud Platform & Mobile Tommy Lieberman Product Manager, User Experience
  • 2. 2 EDDIE GLENN P R O D U C T M A R K E T I N G M A N A G E R , F R A U D P R E V E N T I O N TOM M Y L I EBER M AN P R O D U C T M A N A G E R , U S E R E X P E R I E N C E
  • 3. 3 USER EXPERIENCE MATTERS. IT SELLS. IT BUILDS LOYALTY.
  • 4. AGENDA 4 n BALANCING FRAUD PREVENTION, SECURITY, USER EXPERIENCE n DEVICE INTELLIGENCE n DYNAMIC AUTHENTICATION n MACHINE LEARNING FOR PREDICTING RISK AND TRUST n CLOSING REMARKS
  • 5. 5 ONLINE SECURITYONLINE FRAUD Credit card fraud Affiliate fraud Arbitrage Bonus abuse Stolen identity Account take over Breached credentials Spoofing Unauthorized access Replay attack YOUR CUSTOMER
  • 6. 6 WHAT’S YOUR USER EXPERIENCE LIKE? ACCOUNT CREATION Probably already pretty low-friction But other than email, you likely know very little about them Do you assume new players are bots, potential fraudsters, or your best new customer?
  • 7. 7 WHAT’S YOUR USER EXPERIENCE LIKE? LOGIN How complex are your password requirements? Do you offer a password-less option? What happens if a password is forgotten? How do you protect against unauthorized logins? How do you reward your best customers?
  • 8. 8 WHAT’S YOUR USER EXPERIENCE LIKE? DEPOSITS, WITHDRAWALS, PURCHASES Do you require additional verification or authentication? If so, what kind? Do you place limits/restrictions on new players? What’s your process for dealing with high-risk players? How do you reward your best players?
  • 9. 9 COMPETING NEEDS • Less user friction overall • Better customer experiences • More immediate access • Build brand loyalty • Ensure more time spent on the site PRODUCT & APP OWNERS • Reduce attack surface • Manage and minimize risk • Stop fraud & cheating • Leverage existing capabilities, infrastructure • Real-time threat indicators SECURITY & FRAUD TEAMS
  • 10. 10 3 WAYS TO IMPROVE CUSTOMER EXPERIENCE WHILE PROTECTING YOU & YOUR CUSTOMER FRICTIONLESS FRAUD PREVENTION CUSTOMER AUTHENTICATION PREDICTIVE TRANSACTION INSIGHT
  • 12. 12 Your customer 63% world’s population with mobile 2015 75%(est) world’s population with mobile 2020 www.gsma.com/mobileeconomy/
  • 13. 13 DEVICE INTELLIGENCE DEVICEINTELLIGENCE DEVICE LOCATION DEVICE BEHAVIOR DEVICE RISKS DEVICE HISTORY DEVICE REPUTATION OPERATOR’SBI USER IDENTITY USER BEHAVIOR USER HISTORY USER PAYMENT INFO This separation is useful for: n Privacy compliance n Incidents of breached credentials or stolen identity n Fraud prevention collaboration across industries while obfuscating user identity n Secondary protection for self-exclusion A S E P A R A T E D L A Y E R O F C U S T O M E R I N T E L L I G E N C E
  • 14. 14 DEVICE INTELLIGENCE Hundreds of attributes collected ‘Fingerprint’ compared to billions of previously collected fingerprints Frictionless to end user ‘Fingerprint’ collected in real-time Device risk indicators Associations to other devices, accounts, fraud A DIGITAL FINGERPRINT OF THE DEVICES THAT CONNECT TO YOUR WEB AND MOBILE APPS
  • 15. 15 ADDRESSING FRAUD PREVENTION, SECURITY & USER EXPERIENCE Is device authorized for this account? Where is device located? Does device have a history of fraud? Is this a trusted or risky transaction? How many accounts has device accessed? Is device hiding from detection or exhibiting other risks? FRICTIONLESS. INVISIBLE TO USER. SAFE. RELIABLE.
  • 16. 16 WHAT DEVICE INTELLIGENCE IS NOT Does not use personal identifying information Does not tie a device to a named individual Does not prevent winners from winning more Does not track a user’s browsing history Does not track gaming behavior or wins/losses Does not encourage losers to spend more
  • 17. 17 Your view ADVANCED DEVICE INTELLIGENCE n iovation knows related devices and accounts Fraud Report n If fraud is detected & confirmed, evidence is placed on the account n Related devices and accounts become associated with the fraud stopping additional fraud attempts DEVICE ASSOCIATIONS DO NOT REQUIRE PII
  • 18. 18 iovation’s view Your view n iovation links devices between subscribers and even different industries Fraud Report n If another iovation subscriber confirms fraud on their account… PERSISTENT DEVICE IDENTIFICATION & ASSOCIATIONS STOP FRAUDSTERS AS THEY MOVE BETWEEN BUSINESSES AND INDUSTRIES ADVANCED DEVICE INTELLIGENCE
  • 19. 19 iovation’s view Your view n Then you can use this to deny transactions on accounts that are accessed by the fraudulent device Fraud Report THIS STOPS KNOWN FRAUDULENT DEVICES EVEN IF YOU HAVE NEVER SEEN THEM BEFORE ADVANCED DEVICE INTELLIGENCE
  • 20. STOPPING FRAUDSTERS & CHEATERS WITHOUT ADDING FRICTION FOR LEGITIMATE PLAYERS
  • 21. 21 D E V I C E I N T E L L I G E N C E C A N S T O P G A M B L I N G / G A M I N G F R A U D D E V I C E R I S K S A N D D E V I C E B E H A V I O R R I S K S Evasive behavior Inaccurate geo-location Emulator, virtual machine Jailbroken, rooted Used for multiple accounts High # of transactions Associated with past fraud Past self-exclusion Without added friction for your legitimate players
  • 22. 22 Exposing online gambling fraud. Threats are higher in gambling than anywhere else online. BONUS ABUSE CHIP DUMPING COLLUSION ALL-IN-ABUSE ARBITRAGE BETTING SELF-EXCLUSION
  • 23. 23 Catch players involved in fraud schemes. We reveal multiple devices accessing one or more accounts and one device accessing multiple accounts. Account 1 Account 2 Account 3 Account 4
  • 25. 25 Is this your player’s login experience? Your users want a delightful experience… …but with the assurance their account is secure Device-based authentication provides advanced security you need without the hassle for your players
  • 26. 26 DEVICE BASED AUTHENTICATION F R I C T I O N L E S S , C O N T E X T U A L A N D A D A P T I V E D E V I C E - B A S E D A U T H E N T I C A T I O N FRICTIONLESS CONTEXTUAL ADAPTIVE Transparent authentication Patented device recognition Machine learning adapts to normal changes and deviations Assess the risk and context of every session React in real-time to anomalies Understand device reputation and associations Dynamic authentication decisioning Respond to different degrees of risk Drive step-up or other actions DEVICE ID GEO / IP INTEGRITY CONTEXT REPUTATION Match Low Change High Change
  • 27. 27 MULTIFACTOR AUTHENTICATION B E T T E R U S E R E X P E R I E N C E E V E N F O R H I G H R I S K T R A N S A C T I O N S Drive all authentication through one mobile experience, with configurable options Single-party or multi-party real time swipe authorization Geo-fencing and time- fencing constraints create secure login zones Proximity - Requires a preset Bluetooth device to be nearby Fingerprint - Biometric scans using customer’s mobile device Circle Code - Graphic pattern uses customer’s mobile device PIN Codes - Authenticate using user-defined PIN codes
  • 29. 29 FRICTIONLESS USER EXPERIENCE WITH TRANSPARENT FRAUD PREVENTION & AUTHENTICATION REWARD GOOD CUSTOMERS Build brand loyalty Grow revenue Grow market share
  • 30. 30 Building Brand Loyalty Accelerate VIP status offers Offer bonus chips Accelerate deposit limit increases Less cumbersome deposit procedures while minimizing your risk
  • 31. 31 Machine learning with device intelligence data can predict transaction outcomes: • Highly risky (likely to be fraudulent) • Highly trustworthy 23B online transactions Millions of combinations analyzed 30M confirmed fraud reports 3B known devices
  • 32. 32 Predictive Transaction Insight Device Behavior & Attributes Device transaction velocity Evasive, rooted/jailbroken, other risk indicators Associated with past fraud? Account Behavior Account transaction velocity Associated with past fraud? Demographic City, ISP, geolocation Patterns of geo-location attributes Mismatch of location indicators Subscriber Subscriber and transaction timezone patterns
  • 34. 34 USING DEVICE INTELLIGENCE TO IMPROVE END TO END USER EXPERIENCE Learn more about the user without adding friction Offer trustworthy users incentives to create an account and play Keep out devices that are risky or associated with past fraud. NEW ACCOUNT CREATION Eliminate need for passwords while protecting against account take over Offer trustworthy users incentives to play more LOGIN Offer easier & convenient payment options for trustworthy customers Identify high-risk customers without adding friction to good customers Offer low-friction multi- factor authentication to protect the account DEPOSITS, WITHDRAWALS, PURCHASES
  • 35. 35 ONLINE SECURITYONLINE FRAUD Credit card fraud Affiliate fraud Arbitrage Bonus abuse Stolen identity Account take over Breached credentials Spoofing Unauthorized access Replay attack YOUR CUSTOMER