User Behavior Analytics

Quickly identify and stop anomalous user activity through rich analytics

Anchor: Overview

The Challenge

The threat landscape has changed so dramatically over the last several years, that what was once a good security strategy likely cannot keep up with today’s complex and modernized threats, which change on a daily basis. Gone are the days of traditional tools being enough protection to secure critical applications, payments processes, intellectual property and confidential data. It is imperative that organizations innovate to protect themselves by adopting agile solutions that focus on true user behavior regardless of the point of origination.

Our Solution

Bottomline’s User Behavior Analytics solution quickly identifies and stops anomalous user activity through machine learning, rich analytics and years of experience protecting some of the largest corporations and financial institutions in the world. The solution captures all user behavior in real-time across all vital systems and provides protection for both external threats in which user credentials have been compromised and internal threats from authorized users. Powered by an analytics engine, statistical profiling of users and peer groups, alert correlation that includes predictive risk scoring and the ability to visually replay all user activity, the solution is purpose built for today’s threat landscape.

Anchor: Resources


Treasury Fraud & Controls 2017 Survey Report Infographic


Stop Internal Patient Privacy Threats: Four Cases of Potential Internal Threats

Anchor: Benefits


  • Detect suspicious activity quickly with an intelligent platform that is built on a foundation of real-time user behavior analytics and machine learning infused with the domain expertise of world-class UBA experts and data scientists
  • Gain complete visibility via a record of activity of all users, including privileged IT users, with visual replay of every screen, keystroke, and flow of screens in applications accessed
  • Reduce investigation time significantly and improve effectiveness in identifying, analyzing, and documenting suspicious behavior
3B – the number of user credentials that were reported by organizations as compromised last year -  Source: Gartner [Align Your Financial Fraud Detection Strategy With Gartner’s Capability Model], [Jonathan Care, Tricia Phillips], [July 26, 2017]
Anchor: Functionality
Statistical and analytic tools for suspicious activity analysis


  • Detects internal, external threats and data leakage
  • Monitors network security in real-time
  • Captures a detailed user behavior audit trail with visual replay of every screen in core business applications
  • Analytical engine and statistical profiling of users and peer groups
  • Correlates alerts with predictive risk scores
  • Addresses compliance, risk and security use cases.
  • Learn more about the Bottomline Cyber Fraud and Risk Management platform.

Anchor: Testimonial

Customer Testimonials

"An international long-term savings and investment group with over 12 million customers and approximately 15,000 local employees (55,000 worldwide) deployed BT CFRM to monitor employee activity in corporate systems and to detect insider fraud. Five months into the implementation project, the system alerted on suspicious activity of several employees, which led to an investigation that revealed collusion between several insiders and a crime ring intent on stealing company’s funds, preventing an estimated two million dollar loss."
International long-term savings and investment group

Other Bottomline Solutions Within Cyber Fraud and Risk Management

Secure Payments


Contact Us:

For Customer Support and Services click here.