Governance & Risk Management , Incident & Breach Response , Security Operations

How to Check a Device's 'Reputation'

iovation's Max Anhoury on Fraud-Fighting Techniques
How to Check a Device's 'Reputation'

One key fraud-prevention strategy for card issuers is to check the "reputation" of the device behind a transaction, says Max Anhoury of iovation.

See Also: The Essential Guide to Security

Fraudsters are commonly using personal information obtained from data breaches to impersonate consumers so they can gain access to complete credit reports and then apply for new credit cards, Anhoury says. "We can no longer count on our information being a secret," he contends.

To avoid issuing credit cards to these fraudsters, financial institutions should check the reputation of the device used for the credit application, he suggests. Iovation has a database of 3 billion devices worldwide that issuers can use to check in real time whether a particular device has been previously used for an account takeover or synthetic identity theft or has other indicators of risk.

In an interview with Information Security Media Group at the Fraud Summit Chicago, Anhoury describes:

  • The process fraudsters use to obtain new credit cards;
  • How investigating the reputation of a device works to help prevent fraud;
  • Other key elements of a defense-in-depth strategy, including risk-based authentication and behavioral analytics.

Anhoury is vice president of global partnerships at iovation. He has more than 20 years of sales and operational experience. Before iovation, he was co-founder of CommerePath Inc., which was acquired by Captaris in 1999. He also served as president of TOPLINE Performance, which was involved in the general aviation field.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.