article thumbnail

How Perficient and Microsoft Can Help You Return to Work

Perficient

We work with you to accelerate your development practices in the cloud by combining training and direct hands-on team coaching to rapidly introduce DevOps practices and encourage joint agile. Keep your crucial legacy applications secure and reduce costs by migrating them to Microsoft Azure with our Application Migration Accelerator.

Strategy 429
article thumbnail

Deep Dive: Why New Hacking Technology Has Made Application Fraud More Difficult To Fight

PYMNTS

First-party fraud seems difficult to perpetrate because loan applications typically require identity verification with Social Security numbers, which enable banks to track down loan applicants who go off the grid. The bad actors then cut off all contact with the bank, preventing it from recouping its losses.

Fraud 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Small Business Banking Tests The Digital Identity Waters

PYMNTS

Knowledge-based authentication (KBA) tools, including passwords and security questions, tend to be the primary strategy for verifying identity, and this is true for areas of financial services beyond the consumer world.

Strategy 124
article thumbnail

Jumio CTO Paints A Portrait Of ‘IDV Nirvana’

PYMNTS

The Pros and Cons of Standard Security Choices. For instance, knowledge-based authentication is well-understood by users – but the answers to security questions can be socially engineered without too much trouble just by visiting victims’ social profiles. Then there’s two-factor authentication.

Fraud 129
article thumbnail

Pindrop’s Solutions Fight Call Center And Voice Fraud

PYMNTS

But what’s left out of this picture, said David Dewey, director of research at Pindrop Security , is the element of voice. Founded in 2011, Pindrop’s security solution was built to protect banks and other financial institutions from call center and voice fraud. They let me right in,” Dewey said.

Fraud 107
article thumbnail

Why Strong Digital Identity Verification Is Key To Meeting AML Requirements

PYMNTS

specifically, identity verification has long relied on credit-based data — the existence of credit history along with knowledge-based authentication (KBA) questions — in digital channels or by showing a physical, government-issued ID in person. In the U.S.

Meeting 111
article thumbnail

How to Win Fans and Influence Profits: Using Digital Transformation to Achieve Hyper-Personalization

FICO

By building a 360 º view around their customers, companies are able to develop a very detailed knowledge base around each customer that reveals all sort of unprecedented insights about their future behaviors and needs. No need to tell them it came from knowledge base full of algorithms. It’s the thought that counts.

How To 52