The Challenge

Insider fraud represents a growing cause of revenue loss to organisations, as seen in a 2014 ACFE report attributing 5% of organisational revenue loss to internal fraud incidents. In spite of significant investment in security, organisations lack the ability to proactively monitor employee and user behavior in sensitive systems in real time, nor can they flag and stop suspicious or unauthorised actions.


Our Solution

Bottomline's insider fraud solution leverages proven and specialised pre-configured rules to compare user behaviour with historical actions to alert security teams of unauthorised or suspicious insider and employee behaviour, preventing crime, data theft, and identity theft. The solution creates accountability by capturing user behaviour across a multitude of platforms in heterogeneous environments, eliminating information and activity silos to create enterprise wide and centralised visibility. In addition, once employees are aware they are being monitored, unauthorised activity drops. 

Benefits

  • Significantly reduce the risk of malicious insider activity and negative impact on your reputation.
  • Maintain complete visibility into user activity across all platforms without relying on log files and without changing the monitored applications code.  
  • Create total employee accountability, while preventing data leakage, identity theft, and fraud.
  • Deter fraudulent employee activity and data theft by knowing that all employee actions are being monitored.
  • Take full control of the system and respond quickly to new threats with no need to involve the vendor and with minimal involvement from IT.

Benefits
Benefits

Functionality

  • Complete library of pre-packaged rules, alerts, and reports aimed at preventing insider fraud including periodic updates of fraud schemes and business rules.
  • Online automatic recording of employee activity and cross-platform business flow with visual replay of user screens and keystrokes.
  • Complete audit trail of employee activity including a powerful search and reporting mechanism.
  • Statistical and analytic tools for suspicious activity analysis (profiling, peer group, and link analysis).
  • Real-time alerts that allow immediate action before data or money is lost.

All Bottomline Cyber Fraud and Risk Management solutions use a common platform to capture, normalise, analyse, and act. With this platform all data is captured, normalised, encrypted, and signed—making it easy to analyse suspicious behaviour over time and across applications, analyse and prevent new types of fraud, ensure compliance, and provide legally admissible forensic evidence. A common user interface for all types of fraud and compliance analysis maximises productivity of network operators and fraud investigators.  Learn more about the Bottomline Cyber Fraud and Risk Management platform.

Customer Testimonials

An international long-term savings and investment group with over 12 million customers and approximately 15,000 local employees (55,000 worldwide) deployed BT CFRM to monitor employee activity in corporate systems and to detect insider fraud. Five months into the implementation project, the system alerted on suspicious activity of several employees, which led to an investigation that revealed collusion between several insiders and a crime ring intent on stealing company’s funds, preventing an estimated two million dollar loss.

International long-term savings and investment group

Get Started