
Phishing emails, electronic messages, and websites could be considered the biggest threat to worldwide business security today. They remain all-too-common vehicles for corporate data breaches, credit card fraud, and identity theft when phishing emails are taken seriously, links are clicked, or private information is exchanged.
WHY USE CSC FOR FRAUD PROTECTION?
Rapid detection and takedown of phishing attacks
Commitment to innovation with our Fraud Protection solutions
Unparalleled customer service
Follow-the-sun 24/7/365 Service Organization Control (SOC) and globally distributed response team
U.S. – California and Delaware • U.K. – Cambridge • India – Hyderabad • Hong Kong
Global fraud blocking network
Browsers • Partners (e.g., APWG, AV Partners, global domain name registries and registrars) • Internet service providers (ISPs) • Security information and event management (SIEM) companies (e.g., FireEye)
FRAUD PROTECTION ARCHITECTURE
Data collection and aggregation
Honeypots
Zone file differentials
Partner data feeds: fraud feeds, web logs, abuse inbox, images analysis, search engine results
Machine analysis, correlation, and scoring
Threat analysis and correlation engine: correlation, filtration and automation engines, and customer-specific rules applied to content
Smart scoring engine: source code fingerprint matching technology scoring system
Phishing validation and forensics collection
SOC validation: manual review based on priority and customer request
Forensics data collection: phishing kit extraction, collection points, source code, screenshots, stolen credentials
Enforcement takedowns and internet blocking
Fraud notification alert, ISP, SIEM
Takedown enforcement
UDRP filing
FRAUD PROTECTION PORTAL
Create customized reporting and dashboards, and manage results and view overall statistics to pinpoint specific threat vectors.
WE'RE READY TO TALK
Our specialists are ready to answer your questions about Enterprise Fraud Prevention.