Fraud Brochure

download Fraud Brochure

of 3

Transcript of Fraud Brochure

  • 7/28/2019 Fraud Brochure

    1/3

    The amount of money lost to fraud a year is staggering:globally, organizations lose 5% or $2.9 trillion in revenueannually. Investigators and analysts face tremendousvolumes of data which they must correlate in a rapidlyshifting environment. Fraud is committed on electronicnetworks at lightning speed by global rings of criminals,terrorists and insiders using sophisticated methods hiddenin complex layers of transactional data. The evidence canvanish before anyone is aware a crime has occurred. With30 years of experience producing investigative results forlaw enforcement and corporate customers all over theworld, i2 has assembled a best-in-class intelligence-ledsolution to combat fraudsters and transform data intoactionable intelligence.

    RAPIDLY SEARCH MULTIPLE DATASOURCES SIMULTANEOUSLYPowerful data acquisition tools simultaneously connectwith and search multiple data sources in seconds. Resultsare returned as analytically-modeled data ranked byrelevance. Automated querying techniques and fuzzy logicmatching ensure thoroughness and powerful pre-analysistools quickly shrink large volumes of data by relevance.

    CONNECT THE DOTS THE RIGHT DOTSi2s database technology enables the capture, managementand collaborative analysis of data and the dissemination of actionable intelligence and insight. Search 360 technologyenables analysts to discover all links and relationshipsregardless of data format, data entry, transcription orfuzzy errors. Data mining allows users to drill down intodata to look for patterns and make predictive analysis.Powerful visual query capabilities give analysts the abilityto browse, mine, research and gain insight into data.

    VISUALIZE NETWORKS ANDTRANSACTIONSi2s renowned visualization technology provides powerfulcapabilities to visualize relationships, transactions andtimelines in fraud investigations. This information can beshared with investigative teams and creates open-and-shutcase documentation. Fraud perpetrators can even begeospatially mapped by physical or IP address.

    SHARE INTELLIGENCE ACROSS WORKGROUPSAdvanced push/pull data sharing allows analysts andinvestigators to share evidence and analytic results innear-real-time.

    P A R T O F T H E i 2 C L A R I T Y P L A T F O R M

    i2s Fraud solution helps stop fraudsters in their tracks by empowering analysts to search multiple data sourcessimultaneously, find hidden links and entities, visualize transactions and timelines, and share intelligence across workgroups.

    FraudDETECT & DEFEAT EXTERNAL AND INTERNAL FRAUD

    STOP CRIMINAL & TERRORIST FINANCING

    Visualize complex fraud networks in cyberspace or the real world

    Analyze transactional and communications timelines including individuals and financial sums

  • 7/28/2019 Fraud Brochure

    2/3

    Fraud

    An integrated suite of powerful tools with proven results specially designed to help investigate, analyze, disrupt, and defeat fraud.

    Rapidly Search Multiple Internal andExternal Data SourcesAutomatically log on and simultaneously search multipledatabases. Analysts can even search deep hash data onpeer-to-peer networks.

    Find Entities, Identify Relationships

    and Patternsi2s Fraud solution provides a unique common investigativeplatform which finds hidden connections across numerousdata sources. Rapidly correlate large amounts of data toprovide analysts with actionable intelligence. Filters andhistograms show patterns and anomalies in data. Advancedquerying techniques help identify connections and pinpointthe source of activity.

    Analyze Multiple MediumsVisualize fraud from any medium: Internet, bank networks,telecom networks and more.

    Visualize Results, See the Whole PictureSee the big picture: networks, transactions and relationshipsyou might otherwise miss from text-style reports or lesspowerful visualization solutions. Fraudsters can begeospatially mapped using numerous data points.

    Perform Enterprise-wide e-DiscoveryAdvanced technology allows analysts to examine the corpusof data across an enterprise to correlate and visualize largecomplex data sets.

    Score Risk

    Score and monitor for ris k, compliance and integrity.Automate labor-intensive risk scoring and monitoring usingspecialized tools.

    Open and Shut Case Documentationi2 tools build solid documentation during investigations; i2analysis charts for fraud cases are the industry standard inlaw enforcement, legal and prosecutorial arenas.

    Increase Speed and Volume of Analysis for Any Type of Fraud Investigation Financial (bank and credit card) fraud Mortgage fraud Tax fraud Insurance fraud Entitlements fraud Intellectual property theft on peer-to-peer networks Stock manipulation and securities fraud Identity theft Gaming fraud Pharmaceutical fraud Procurement fraud Internal fraud of all types

    Serving Multiple Constituencies withOne Goal: Solve Investigations Faster to Stop Fraud, Waste and Abuse Government agencies Law Enforcement Financial institutions Insurance companies Pharmaceutical companies Gaming industry

    Full-spectrum connection and seamless collaborationmean you won't miss crucial relationships and details.

    Upon utilizing i2 products, we revealed far more useful intelligence that allowed usto not only to detect more fraud, but moreimportantly, we were able to stop it.

    Raphael Lawson, Head of Fraud Investigation Unit,Card Protection Plan

  • 7/28/2019 Fraud Brochure

    3/3

    WORLD-CLASS ALLIANCESi2s Fraud solution makes availablethrough strategicalliancesthe kind of data and research from world-classfraud analysis sources such as World-Check, Spamhaus,Portland Risk Analytics and LexisNexis that will help youinvestigate and close cases more quickly and preventfuture fraud and abuse.

    EXPERT SUPPORT FOR FASTINTEGRATION AND TRAININGi2s Fraud solution includes training by top industryexperts in data analysis who will quickly get your staff up and running.

    PROFESSIONAL SERVICESi2 has a staff of highly experienced specialists who areavailable to provide deployment expertise to get yourFraud solution connected and operational.

    EASY EXPANSION

    As the threat environment changes and more datasources become available, i2 continues to developadditional modules, connectors and capabilities that canquickly and easily be added to our Fraud solution.

    LOW TOTAL COST OF OWNERSHIPFlexible schema enables the business to adapt asoperational workflow requirements evolve. Regularmarket-driven product releases keep total cost of ownership low. End-users can design intelligence templatesto suit their data and workflow specialized IT skills notrequired. Rapid out-of-the-box deployment, incrementalexpansion (desktop through to enterprise) and quick ramp-up to full productivity for low startup costs.

    For more information see www.i2group.com

    RO _FRAUD_ AM_231 52011 _ Low

    More Built-in Benefitsof i2s Fraud SolutionMore than just the leading provider of global intelligence and investigation solutions, i2 is your trusted partner in

    creating and sharing meaningful, reliable solutions and information to combat fraud. Our technology and supportservices, included with the Fraud solution, will help you get the results you're after and achieve the successes thatcan make all the difference.

    www.i2group.com

    i2, the i2 logo, COPLINK and Analysts Notebook are registered trademarksof i2 Limited. Copyright i2 Limited 20 11. All rights reserved.

    i2 is your trusted partnerin creating and sharingmeaningful, reliableanti-fraud information.

    i2 partners with organizations such as World-Check, Portland Risk Analytics,Spamhaus and others to provide rich supplemental intelligence for Fraud investigations