SlideShare a Scribd company logo
ca Securecenter 
Ten Commandments for Tackling Fraud: 
The Role of Big Data and Predictive Analytics 
Revathi Subramanian 
SCX11S #CAWorld 
SVP, Data Science 
CA Technologies
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
RevathiSubramanian 
CA TechnologiesSVP, Data Science 
Author of “Bank Fraud: Using Technology to Combat Losses” 
Accurate enterprise-wide data combined with data-driven fraud analytics can have a transformational effect on banking and related industries. Revathiwill provide tips and insights on using technologies like neural network predictive modeling, user behavior-based pattern recognition and statistical big data analytics to reduce the risk of fraudulent activities in the enterprise.
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Current Challenges with Fraud Management 
FraudPrevention 
Operational Costs 
Customer 
Experience
4 
© 2014 CA. ALL RIGHTS RESERVED. 
It’s a balancing act. 
Achieving balance is the only way to increase customer acceptance. 
Failing to achieve balance results in lost business and unhappy customers. 
CUSTOMER 
EXPERIENCE 
FRAUD PREVENTION 
OPERATIONAL COSTS 
✔
5 
© 2014 CA. ALL RIGHTS RESERVED. 
1. Data: Garbage In; Garbage Out 
“On two occasions I have been asked, ‘pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?’ … I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question.” Charles Babagge, ‘Passages from the Life of a Philosopher’
6 
© 2014 CA. ALL RIGHTS RESERVED. 
2. No documentation? No change! 
“When dealing with data, a rose by a different name is not the same as a rose.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
7 
© 2014 CA. ALL RIGHTS RESERVED. 
3. Key employees are not a substitute for good documentation. 
“Oh yeah! We made that change sometime in April and unfortunately we don’t have too many more details.”
8 
© 2014 CA. ALL RIGHTS RESERVED. 
4. Rules: More doesn’t mean better. 
“As it is with children or pets, having too many rules is generally counterproductive. Too many rules tend to confuse them. Interestingly, fraud management systems are no different.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
9 
© 2014 CA. ALL RIGHTS RESERVED. 
5. Score: Never rest on your laurels. 
“As fraud management systems get sophisticated, fraudsters also get sophisticated … Scoring processes have to keep on improving in order to tackle fraud effectively.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Non-linear models are a requirement for any complex risk management problem. 
Modeling technology used needs to look beyond the “Brownian motion.” 
Needs to take into account the entire domain’s fraud patterns 
Needs to constantly improve –automated yearly refreshes with regional tweaks 
Advanced Analytical Scoring = Huge Value
11 
© 2014 CA. ALL RIGHTS RESERVED. 
6. Score + Rules = Winning Strategy 
“A sophisticated scoring system combined with a limited set of rules to take into account operational considerations is the winning combination … Having too many rules can water down the fraud management system, but even the best scores are not very useful unless the operational use of the scores is streamlined with some carefully crafted rules… .” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Rules should be used to satisfy its business needs using a highly predictive score. 
Rules can also implement business policy. 
Business needs change over time and the rules need to change with that. 
One size does not fit all; There should be no need to go back to the tailor to get the best fit either.  
Scores tell you who might not be legitimate. 
Rules are what you decide to do with that knowledge. 
Any system that requires you to outsource rules is a problem. 
Maximum Precision with Maximum Flexibility
13 
© 2014 CA. ALL RIGHTS RESERVED. 
7. Fraud: It is everyone’s problem. 
“Every little bit of information we drop on the floor, every transaction that doesn’t get recorded, every rule that doesn’t get used right, every score that doesn’t get used optimally, every fraud analyst that doesn’t get trained well has an impact on the overall fraud management picture.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Online fraud problem is huge. 
Digital footprint left behind by the customer is a goldmine of information that can be tracked and utilized with advanced analytics. 
Device/browser characteristics can identify issues very quickly and precisely using advanced analytics. 
Possible to track a device in real-time and nab the fraudster before major damage is done 
Digital World: Goldmine of Information
15 
© 2014 CA. ALL RIGHTS RESERVED. 
9. Fraud Control Systems: If they rest, they rust. 
“Fraud control systems have to evolve and change with the times, and the changes have to happen in an agile fashion.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
16 
© 2014 CA. ALL RIGHTS RESERVED. 
10. Continual Improvement: The cycle never ends. 
“Every time there is a leap forward in the digital world, there is an equal leap forward in what the fraudsters can do to increase the losses.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Consider the important factors in a payment transaction: 
Each has unique history, distilled down to the critical information and combined with the transaction through a complex non-linear model to produce a score. 
Beyond the Simple: Pivots Aperson, thing or factor having a major or central role, function or effect 
Customer 
Card 
Device 
Merchant 
Customer 
Card 
Device 
Merchant 
Transaction 
789
18 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
19 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. 
Terms of this Presentation

More Related Content

PDF
Uses of analytics in the field of Banking
PDF
Microdecision Making in Financial Services - Greg Lamp @ PAPIs Connect
PDF
predictive-analytics-the-silver-bullet-in-efficient-risk-management-for-banks
PPTX
Analystics in banking and financial services
PPTX
AI powered decision making in banks
PPT
Vcu Stm Transformation 02 15 10
PPTX
Analytics in banking services
PDF
Masters thesis - Fraud & Big Data
Uses of analytics in the field of Banking
Microdecision Making in Financial Services - Greg Lamp @ PAPIs Connect
predictive-analytics-the-silver-bullet-in-efficient-risk-management-for-banks
Analystics in banking and financial services
AI powered decision making in banks
Vcu Stm Transformation 02 15 10
Analytics in banking services
Masters thesis - Fraud & Big Data

What's hot (16)

PPTX
Data driven approach to KYC
PDF
Fraud Detection presentation
PDF
Predictive analytics solution for claims fraud detection
PPT
Ibm financial crime management solution 3
PDF
Enterprise Fraud Management: How Banks Need to Adapt
PPTX
Fraud analytics
PPT
Detecting Opportunities and Threats with Complex Event Processing: Case St...
PDF
5 AI Solutions Every Chief Risk Officer Needs
PDF
Big Data in Banking (White paper)
PDF
IBM Smarter Analytics Solution for insurance
PDF
A Study on Credit Card Fraud Detection using Machine Learning
PDF
Customer Successes - Predictive Analytics v5
PPT
Managing The Business Risk Of Fraud
PDF
Enterprise Fraud Risk Management
PPTX
Big data research
PPTX
How Big Data Can Lead to Bigger ROI
Data driven approach to KYC
Fraud Detection presentation
Predictive analytics solution for claims fraud detection
Ibm financial crime management solution 3
Enterprise Fraud Management: How Banks Need to Adapt
Fraud analytics
Detecting Opportunities and Threats with Complex Event Processing: Case St...
5 AI Solutions Every Chief Risk Officer Needs
Big Data in Banking (White paper)
IBM Smarter Analytics Solution for insurance
A Study on Credit Card Fraud Detection using Machine Learning
Customer Successes - Predictive Analytics v5
Managing The Business Risk Of Fraud
Enterprise Fraud Risk Management
Big data research
How Big Data Can Lead to Bigger ROI
Ad

Viewers also liked (20)

PPTX
Data preprocessing
PDF
Big data usage in fraud
PPTX
Fraud Prevention in Corporate Environment
PDF
Fraud-Fighting Trends 2017
PPTX
Current Threat Landscape, Global Trends and Best Practices within Financial F...
DOC
Aamod_Chandra
PPTX
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
PPTX
Motivation for big data
PDF
The Great Unknown - How can operators leverage big data to prevent future rev...
PDF
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
PDF
Webinar: Using Big Data Technology in Fraud Prevention
PDF
Experiences with big data by Srinivasan Seshadri
PDF
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
PPTX
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
PDF
Online Fraud Detection Using Big Data Analytics Webinar
PPTX
Big Data Application Architectures - Fraud Detection
PDF
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
PDF
Machine Learning for Fraud Detection
ODP
Exploratory factor analysis
PDF
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Data preprocessing
Big data usage in fraud
Fraud Prevention in Corporate Environment
Fraud-Fighting Trends 2017
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Aamod_Chandra
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Motivation for big data
The Great Unknown - How can operators leverage big data to prevent future rev...
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
Webinar: Using Big Data Technology in Fraud Prevention
Experiences with big data by Srinivasan Seshadri
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Online Fraud Detection Using Big Data Analytics Webinar
Big Data Application Architectures - Fraud Detection
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
Machine Learning for Fraud Detection
Exploratory factor analysis
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Ad

Similar to Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics (20)

PDF
Brighterion bai july 2016 fraud white paper
PDF
Fraud Management Solutions
PPTX
Fraud Analytics - Discussion
PDF
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
PDF
Levon Ter-Isahakyan, Agoda. Machine Learning and Culture changes for better F...
PPTX
A guide to Financial Crime Management
PPTX
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
PDF
Transactional Fraud Detection A Modular Approach
PDF
EAI Checklist
PDF
#Kdk at bank mgt conf 2010
PPTX
Fraud analysis
PPTX
Fraud Analytics
PDF
Uncovering Fraud Dilemmas - cVidya in London May 2012
PDF
The Role of AI in Fraud Prevention and Detection_Enhancing Compliance and Sec...
PDF
1340 keynote minkowski_using our laptop
PPTX
2016 MSCPA Fraud Conference Presentation
PPTX
2016 MSCPA Fraud Conference Presentation
PDF
Insight2014 mitigate risk_fraud_6863
PDF
Addressing Fraud Risk Management with Facts
PPTX
fraud-controlin applications-and789.pptx
Brighterion bai july 2016 fraud white paper
Fraud Management Solutions
Fraud Analytics - Discussion
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
Levon Ter-Isahakyan, Agoda. Machine Learning and Culture changes for better F...
A guide to Financial Crime Management
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Transactional Fraud Detection A Modular Approach
EAI Checklist
#Kdk at bank mgt conf 2010
Fraud analysis
Fraud Analytics
Uncovering Fraud Dilemmas - cVidya in London May 2012
The Role of AI in Fraud Prevention and Detection_Enhancing Compliance and Sec...
1340 keynote minkowski_using our laptop
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation
Insight2014 mitigate risk_fraud_6863
Addressing Fraud Risk Management with Facts
fraud-controlin applications-and789.pptx

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Tartificialntelligence_presentation.pptx
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine Learning_overview_presentation.pptx
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Heart disease approach using modified random forest and particle swarm optimi...
Univ-Connecticut-ChatGPT-Presentaion.pdf

Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics

  • 1. ca Securecenter Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics Revathi Subramanian SCX11S #CAWorld SVP, Data Science CA Technologies
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract RevathiSubramanian CA TechnologiesSVP, Data Science Author of “Bank Fraud: Using Technology to Combat Losses” Accurate enterprise-wide data combined with data-driven fraud analytics can have a transformational effect on banking and related industries. Revathiwill provide tips and insights on using technologies like neural network predictive modeling, user behavior-based pattern recognition and statistical big data analytics to reduce the risk of fraudulent activities in the enterprise.
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Current Challenges with Fraud Management FraudPrevention Operational Costs Customer Experience
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. It’s a balancing act. Achieving balance is the only way to increase customer acceptance. Failing to achieve balance results in lost business and unhappy customers. CUSTOMER EXPERIENCE FRAUD PREVENTION OPERATIONAL COSTS ✔
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. 1. Data: Garbage In; Garbage Out “On two occasions I have been asked, ‘pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?’ … I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question.” Charles Babagge, ‘Passages from the Life of a Philosopher’
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. 2. No documentation? No change! “When dealing with data, a rose by a different name is not the same as a rose.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. 3. Key employees are not a substitute for good documentation. “Oh yeah! We made that change sometime in April and unfortunately we don’t have too many more details.”
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. 4. Rules: More doesn’t mean better. “As it is with children or pets, having too many rules is generally counterproductive. Too many rules tend to confuse them. Interestingly, fraud management systems are no different.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. 5. Score: Never rest on your laurels. “As fraud management systems get sophisticated, fraudsters also get sophisticated … Scoring processes have to keep on improving in order to tackle fraud effectively.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Non-linear models are a requirement for any complex risk management problem. Modeling technology used needs to look beyond the “Brownian motion.” Needs to take into account the entire domain’s fraud patterns Needs to constantly improve –automated yearly refreshes with regional tweaks Advanced Analytical Scoring = Huge Value
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. 6. Score + Rules = Winning Strategy “A sophisticated scoring system combined with a limited set of rules to take into account operational considerations is the winning combination … Having too many rules can water down the fraud management system, but even the best scores are not very useful unless the operational use of the scores is streamlined with some carefully crafted rules… .” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Rules should be used to satisfy its business needs using a highly predictive score. Rules can also implement business policy. Business needs change over time and the rules need to change with that. One size does not fit all; There should be no need to go back to the tailor to get the best fit either.  Scores tell you who might not be legitimate. Rules are what you decide to do with that knowledge. Any system that requires you to outsource rules is a problem. Maximum Precision with Maximum Flexibility
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. 7. Fraud: It is everyone’s problem. “Every little bit of information we drop on the floor, every transaction that doesn’t get recorded, every rule that doesn’t get used right, every score that doesn’t get used optimally, every fraud analyst that doesn’t get trained well has an impact on the overall fraud management picture.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Online fraud problem is huge. Digital footprint left behind by the customer is a goldmine of information that can be tracked and utilized with advanced analytics. Device/browser characteristics can identify issues very quickly and precisely using advanced analytics. Possible to track a device in real-time and nab the fraudster before major damage is done Digital World: Goldmine of Information
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. 9. Fraud Control Systems: If they rest, they rust. “Fraud control systems have to evolve and change with the times, and the changes have to happen in an agile fashion.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. 10. Continual Improvement: The cycle never ends. “Every time there is a leap forward in the digital world, there is an equal leap forward in what the fraudsters can do to increase the losses.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Consider the important factors in a payment transaction: Each has unique history, distilled down to the critical information and combined with the transaction through a complex non-linear model to produce a score. Beyond the Simple: Pivots Aperson, thing or factor having a major or central role, function or effect Customer Card Device Merchant Customer Card Device Merchant Transaction 789
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. Terms of this Presentation