Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
Build Apps 5x Faster
For Half the Cost
Enterprise Cloud Computing

On Force.com
You are here: Home / Tech Trends / IBM Applies Big Data To Fraud Fight
DDoS Protection Powered By Verisign
IBM Applies Big Data Analytics To Fight Against Fraud
IBM Applies Big Data Analytics To Fight Against Fraud
By Barry Levine / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
20
2014


"Smarter counter fraud." That's the name of a new IBM initiative to tackle fraud by using big data analysis in tandem with hundreds of experts.

Fraud and financial crimes cost an estimated $3.5 trillion annually, according to a report from the Association of Certified Fraud Examiners. In its announcement Thursday, IBM said its new "holistic approach" includes Counter Fraud Management Software, which it described as an application that uses the company's big data analytics to "prevent, identify and investigate suspicious activity."

This approach is intended to scour external and internal data sources for hidden relationships between entities, provide visualization of larger fraud patterns and employ machine learning to help prevent similar attacks.

IBM Red Cell

Another component of the initiative is a new counter-fraud intelligence task force, call IBM Red Cell. It will work with the company's X-Force unit, a research and development team that analyzes trends across industries for attack patterns.

New service offerings include Outcome-based Accelerators, where an organization's ability to counter fraud is evaluated and a rapid prototype of protection measures is provided. A Target Operating Model can be generated, which proposes the organizational and technology structure best able to detect, respond to and investigate fraud. A Scale and Manage phase, the company said, can provide fast implementations.

Analytics are conducted in the cloud, and the initial focus will be on medical fraud, insurance claim fraud, public tax fraud and occupational fraud. The IBM Fraud Asset Management System is used to discover medical fraud, the Loss Analysis and Warning System detects insurance claim fraud, and the Tax and Audit Compliance System addresses public tax fraud for governments.

This counter-fraud-as-a-service includes hosting, application management, behavior modeling and scoring, and analytics and referral generation, using a subscription model.

'A Large Opportunity'

Chris Christiansen, an analyst with industry research firm IDC, told us that "the level of fraud and waste in a lot of industries represents a large opportunity" for IBM. He noted that "anti-fraud was featured in a lot of services engagements [from the company,] but now it's a key focus."

There wasn't "any mention of Watson" in the announcement, Christiansen pointed out, referring to the IBM supercomputer whose greater-than-human intelligence is now being applied as a service to various fields, including medical diagnosis. He described Watson as "very interesting in terms of big data and predictive analysis," and said he expected Watson to be a component of these anti-fraud offerings in some fashion.

In a post last month on its corporate blog, industry research firm Gartner predicted that a quarter of large global companies would adopt big data analytics for at least one security or fraud detection incident by 2016. That compares with only 8 percent of global companies doing so today, and Gartner said such big data analytics would show a positive return on investment within the first six months of implementation.

Gartner Vice President Avivah Litan noted on the blog that companies can "cut down on the noise and false alerts in existing monitoring systems by enriching them with contextual data and applying smarter analytics." Big data analysis, she said, also enables the detection of patterns, the pooling of internal and external data in one place, and the ability to find "anomalous transactions" when compared against user profiles.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN TECH TRENDS
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.
 

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.