Now there is: Asignio web-based signature authentication.

Similar documents
Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Keep the Door Open for Users and Closed to Hackers

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Authentication Methods

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

Biometrics problem or solution?

2010 Online Banking Security Survey:

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

6 Vulnerabilities of the Retail Payment Ecosystem

Combating Cyber Risk in the Supply Chain

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Charter Pacific Biometrics Acquisition

How. Biometrics. Expand the Reach of Mobile Banking ENTER

Modern two-factor authentication: Easy. Affordable. Secure.

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

SECURITY TESTING. Towards a safer web world

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

2013 NATIONAL ONLINE SAFETY STUDY

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

REGULATORY COMPLIANCE REGULATORY COMPLIANCE SERVICES. Dynamic Solutions. Superior Results.

FFIEC CONSUMER GUIDANCE

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

The security challenge in a mobile world

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Identity Verification Code of Practice Explanatory Note Updated in December 2017

Challenges and. Opportunities. MSPs are Facing in Security

Signer Authentication

MOBILE DEFEND. Powering Robust Mobile Security Solutions

Governance Ideas Exchange

Top Network Considerations for Enterprise Mobility and BYOD

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

Make security part of your client systems refresh

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

THE EUROPEAN PAYMENTS LANDSCAPE IN THE DIGITAL ERA

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

Authentication Technology for a Smart eid Infrastructure.

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

FFIEC CONSUMER GUIDANCE

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Identity & security CLOUDCARD+ When security meets convenience

Troubleshooting and Cyber Protection Josh Wheeler

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

What is a security measure? Types of security measures. What is a security measure? Name types of security measures

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?

Passwords. EJ Jung. slide 1

Consolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality

User Authentication and Human Factors

Multi-Factor Authentication (MFA)

Post PC Era: Mobile Banking & Payments in Emerging Markets. Report Covers: India, Kenya, Indonesia, Ghana and Nigeria

Global Voice Recognition Market for Smartphones

DESIGNING A BIOMETRIC STRATEGY (FINGERPRINT) MEASURE FOR ENHANCING ATM SECURITY IN INDIAN E-BANKING SYSTEM

THE TRUTH ABOUT CLOUD SECURITY. It s More Secure Than You Think

Village Software. Security Assessment Report

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Smart Card and Biometrics Used for Secured Personal Identification System Development

PayServices Inc. PayServices 2015 All rights reserved

Javelin s Top Financial Institutions for Mobile Banking in 2013

Tracking and Reporting

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Secure access to your enterprise. Enforce risk-based conditional access in real time

NEW MAYBANK APP FAQ GENERAL

Using Social Media and New Media Technologies in Fundraising

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli

lifeid Foundation FAQ v.1

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

ID Theft and Data Breach Mitigation

A Review Paper on Network Security Attacks and Defences

The Future of Authentication

Authentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU)

HIPAA Compliance Checklist

Effective Strategies for Managing Cybersecurity Risks

THE FUTURE IS DECENTRALIZED

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

FAQ: Privacy, Security, and Data Protection at Libraries

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

January 23, Online Banking Risk Management: A Multifaceted Approach for Commercial Customers

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea

Machine-Powered Learning for People-Centered Security

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

Cybersecurity The Evolving Landscape

Applying biometric authentication to physical access control systems

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions

The new standard for user authentication

POPA MOBILE BANKING USER GUIDE

The Value of Automated Penetration Testing White Paper

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

2017 THALES DATA THREAT REPORT

Personal Cybersecurity

Transcription:

THE COST OF KYC AND AML Know Your Customer (KYC) technology and Anti-Money Laundering (AML) compliance are crucial elements of modern banking. Financial institutions are trusted to verify and authenticate customers identities every time a customer uses their accounts and services. However, implementation is costly and ongoing monitoring can be difficult. 1 In a world where a digital data trail is both extremely valuable and extremely vulnerable, protection and authentication of a customer s identity is paramount. A reported $5.2 billion in fines were assessed against financial institutions for AML violations from 2009 to 2015. 2 To reduce money-laundering, fines, and improve compliance, financial institutions need to upgrade their security. But how? THE PROBLEM WITH KNOWLEDGE-BASED AUTHENTICATION Passwords and other knowledge-based authentication methods are difficult to use, difficult to remember, and virtually impossible to secure. The constant need to change and update passwords makes for weaker security and even worse customer experience. While companies try to secure users accounts with security questions, now such personal information is open to social engineering through social media sites like Facebook, LinkedIn, and others. What if there was an authentication system that improved security, strengthened AML compliance, and provided better customer service? Now there is: Asignio web-based signature authentication. 1 World Finance. http://www.worldfinance.com/banking/kyc-regulations-challenge-the-banks 2 Credit Union Times. AML/BSA Fines Total $5.2B Over Six Years. http://www.cutimes.com /2016/04/22/aml-bsa-fines-total-52b-over-six-years-gao?slreturn=1496790726

BIOMETRIC BASICS Rather than using a password that is easily stolen, hacked, or forgotten, biometrics utilize physical or behavioral traits to verify user identity. The pattern of a fingerprint or the inflection of a person s voice are unique traits that are inherent to an individual. Biometric security is safer than a password and is quickly becoming a part of everyday life. HARD VS SOFT BIOMETRICS Hard biometrics measure innate qualities that cannot be changed, such as fingerprints or the pattern of a retina. This kind of biometric security has become increasingly widespread through the proliferation of smartphones with built-in fingerprint scanners. While hard biometrics provide a new measure of safety, they also create a new security problem: once stolen or hacked, hard biometrics are forever compromised. There is no way for a user to change their fingerprints or their irises. Once a hacker acquires an individual s hard biometric data, it can never be used safely again. Soft biometrics measure qualities like variances in handwriting or the inflection of a person s voice. These abilities are just as unique as a fingerprint, but with the added advantage that what the user writes or speaks can be changed if their account becomes compromised. No matter how many times the signature or spoken password changes, the user s unique handwriting or voice maintains consistent underlying characteristics for identity authentication.

CONSUMERS WANT BIOMETRIC SECURITY Though financial institutions constantly struggle with weak KYC solutions and poor AML compliance, advances in biometric security provide new answers. What s more, customers are eager to use biometric security. A recent survey on MarketWired.com found that 79 percent of respondents want more biometric authentication methods to access mobile banking or payment applications. 3 An additional 42 percent said they wouldn t use a banking or payment app which didn t offer biometric security. 4 Biometric security offers a way for financial institutions to differentiate themselves from their competitors and provide better security for their customers. A New York Times article found that after USAA offered biometric authentication in early 2015, it took less than a year for more than 1.7 million customers to begin accessing their accounts using biometric identity verification alternatives. 5 And the number will only continue to grow. 3 MarketWired. http://www.marketwired.com/press-release/eyeverify-surveyreveals-high-consumer-trust-biometrics-mobile-banking-payments-2214109.htm 4 MarketWired. http://www.marketwired.com/press-release/eyeverify-surveyreveals-high-consumer-trust-biometrics-mobile-banking-payments-2214109.htm 5 NYT article. https://www.nytimes.com/2016/06/22/business/dealbook/goodbyepassword-banks-opt-to-scan-fingers-and-faces-instead.html

THE ASIGNIO SOLUTION Asignio is a handwriting-based biometric authentication system. Rather than hard biometrics like fingerprint or retina scans which, once compromised, can never be replaced Asignio uses cutting-edge soft biometric technology to measure more than 25 unique aspects of a person s Asignio Signature. Each Signature can consist of a personalized set of characters or letters.when the consumer signs-in using their Signature, Asignio verifies their identity using three factors of authentication in under three seconds. There is no need for specialized hardware like fingerprint or iris scanners. With Asignio s cross-device capabilities, the only equipment needed to sign-in or authorize transactions is a touch-screen device. ASIGNIO AND KYC The Asignio on-boarding process confirms and protects the consumer s identity, providing a layered security system firmly rooted in ID verification. First, Asignio asks the user for a picture of a government-issued ID. During this one-time verification process, the ID is checked and confirmed independently. The verified ID is then matched to the user s profile. This ensures a strong level of KYC for the financial institution, as Asignio links the consumer s real identity to the correct account. The user then creates their own Asignio Signature. This Signature is tied specifically to the user s ID, thus providing an additional layer of security for both the financial institution and the consumer. Asignio does more than meet standard KYC requirements. Asignio helps financial institutions know their customers continuously. Asignio provides a digital data trail of the user proving the financial institution s AML compliance from onboarding and ID verification through each transaction sign-in and authorization.

ASIGNIO AND AML Asignio s strong foundation in KYC authentication helps financial institutions crack down on AML violations. Because each user s Asignio Signature is tied directly to their ID, Asignio can verify and authenticate the identity of the user during each and every transaction. Asignio uses a layered security system, utilizing both behavioral biometrics and geo-location. By tracking where the user signs in and how they typically use their account, Asignio can quickly respond to any red flags raised by unusual activity. Taken together, these security factors help financial institutions continuously know their customers and further combat AML fines. ASIGNIO: SAFE, SIMPLE, SECURE Asignio works hard to keep both the bank and the consumer safe through the use of the Asignio Signature and layered IDV. With Asignio s web-based, cross-device platform, consumers and financial organizations are secure in the knowledge that every sign-in is authenticated with the highest level of user validation, simplicity, and durability. Any account. Any device. One Signature.