logo (22)

Bottomline Technologies

Bottomline helps businesses transform the way they pay and get paid. With 35+ years of experience moving more than $10 trillion in payments annually, Bottomline’s fraud solutions are on the front lines of the fight against financial crime by monitoring and correlating activity across logins, banking sessions, and monetary transactions.

Location:Portsmouth, NH, United States
Founded: 1989

Fraud Solution Profile

With rapid improvements to technology and the growing complexities of fighting financial crime – bad actors are exposing the gaps in organizations between customer-focused monitoring and the need to track employee activity.  Bottomline brings unique expert insights from protecting billions in financial transactions for over 400,000 organization on our own payment network, Paymode. Through our proprietary payment network and SWIFT bureaus, Bottomline’s solutions are on the front lines of the fight against financial crime and have been built to adapt to and identify new trends by monitoring and correlating activity across logins, banking session activity, and monetary transactions – all while proactively identifying suspicious behavior and potential misuse of internal systems.  With this holistic approach of bridging the gaps between internal and external threats – financial crime teams can better safeguard their institution from threats and maintain strong compliance with regulations.

Secure Payments
Bottomline’s Secure Payments solution protects payments across a variety of applications, channels and payment types including ACH, Wire, SWIFT and Real-Time Payments. With Secure Payments from Bottomline, your organization can reduce risk, prevent fraud, and meet regulatory compliance requirements. Protect your payment channels with out-of-the-box libraries of pre-built integrations and best practice risk strategies. Secure Payments is a comprehensive payments intelligence solution providing real-time alerting and transaction blocking with surgical precision that delivers actionable intelligence to end-users for quicker time to resolution.

Internal Threat Management
The solution records the activity of all users by sniffing the network traffic between the end users and the main servers. The system analyzes the captured traffic in real-time and reconstructs full user sessions, allowing for screen-by-screen replay and behavior analysis. In addition to network sniffing the system can collect information in a variety of ways from databases, data warehouse, log files and other sources in real-time and batch. The data
captured from various sources is stored in one centralized repository and is analyzed by the business rule engine. 

Investigations and Case Management
Suspicious events can be investigated in the Investigation Center, a powerful forensics web-based user-interface, allowing investigators to manage and document the investigation process, view all information relevant to alerts, cases or profiles, in one consolidated view with flexible drilldown options on each related entity.

Visual Replay
The system non-invasively, and without an agent, captures a detailed audit trail allowing complete visibility into end-user activity with visual replay of every screen, user modifications, and flow of screens in core business applications. The system also provides Google-like search
capability on the content of every user screen and session, enabling investigators to immediately get answers to questions such as: which user accessed a specific account number in a given timeframe, and then replay the exact activities of the user screen-by-screen. This functionality enables compliance with GLBA, SOX, PCI and other regulations that require a detailed audit trail of access to sensitive customer data.

 

 Industry
Financial Services, Insurance, Telecom
 Primary Functionality
Fraud Platform
 Fraud Type
Account Takeover, KYC & AML, New Account Fraud, Payment Fraud, Synthetic Identity Fraud
 Technology
Machine Learning, Multi-Factor Authentication, Rules Engine