Click here to close now.




















Welcome!

IoT User Interface Authors: Continuum Blog, Trevor Parsons, Daniel Khan, Ruxit Blog, Harry Trott

Related Topics: Agile Computing, API Journal, IoT User Interface, Cloud Security

Agile Computing: Article

Retail Banks - Dinosaurs in an Online World

We have a recurring issue with our bank - they regularly flag transactions as fraudulent even though the transactions are fine

I had some interesting (sic) experiences with two separate banks with regards to two business accounts that we keep with each recently. The problem highlighted two issues that were both in some ways intertwined:

  1. False positive flagging of online transactions
  2. Identity Management between bank departments

First let me set the scenario. I am CEO of Storage Made Easy, a business that can be categorized (in bank speak) as an online internet business. We are a business that spends a fair amount on online advertising through various different channels and who also uses best of breed online services to make our life easier. Therefore we spend money with other online based internet companies including companies like Google, Amazon etc and we pay certain providers through merchant gateways such as Paypal. I suspect we are not that different to other similar companies in this regards.

We have  a recurring issue with our bank in which they regularly flag transactions as fraudulent even though the transactions are fine. These are what are referred to in the industry as 'false positives'. A false positive is a result that indicates a given condition has been fulfilled, in this case a transaction being flagged as fraudulent, when the condition was not or should have been fulfilled, and in this case the result is that the transaction should not have been flagged. The end result is that the credit card used to pay for such services is suspended until the end user (us) has negotiated with the fraud department of the bank to lift the ban and transactions that are flagged have to be re-submitted, a time consuming and costly process as it means all adverts stop running, payments are not made and someone within the business has to take time out of their day to sort the whole mess out.

You would think it would be fairly straightforward problem to fix. After all the transactions in question have a regular history of being paid each month, in most cases going back over 2 years. Unfortunately this is not the case, the bank merely says "our fraud detection system highlights these transactions as possibly being fraudulent and there is nothing that can be done". My ongoing question is why ? Why are you flagging transactions as being fraudulent that have a historic basis for payment in which the amount in most cases are identical to what was previously being paid over the past two years. This is largely a rhetorical question as no-one in the bank can answer it or even seems to care that it is a perfectly valid question that should be investigated.

The second issue involves getting in touch with the banks fraud department to arrange to have the block lifted. Normally when we speak with the bank we go through a telephone banking authentication process. The bank set this up with us and we have a pin and other personal and password details we have to give. The PIN relates to a challenge / response two factor authentication process. As a company we have a good knowledge of Identity Management, from Active Directory / SAML / Kerberos / LDAP through to OAuth OpenID etc and we also understand the challenges of integrating between the various identity management systems.

When we contact the fraud department they do not use our pre-defined identity management process at all. In fact they ask obscure questions about the account, such as "What was the debit amount for a transaction on 2nd January "etc. These are almost impossible to answer as a by-product of the fraud block is that online banking is also blocked and as we have paperless statements, there is no way to check or validate any of the questions being asked (which in any case are not in anyway related to the identity management process we have in place with the bank). When challenged as to why the fraud department is not using the existing identity management that we have in place the response is "We do not have access to that system". My guess is that as the fraud department seems to be outsourced to Mumbai, this is why, but this is not something we should care about or be impacted by.

My conclusion is that retail banking is akin to web 1.0 companies in a web 2.0 world. They have not changed their processes to work within the dynamics of the internet world, which is driven by online transactions, and their outsourcing exposes the lack of cohesion within their internal systems in which the customer suffers the consequences. There is also a certain type of arrogance within the culture of the bank that leaves me a little cold. There is a real "don't care' "can't do" type attitude.

It seems the option we have is to change banks but I really have little confidence this will solve the underlying issues as we already similar behaviour from the two banks we already use.

Banks now fail in the most fundamental thing you want them to be good at ie. lending money, storing your money and providing transparent secure access to it. They retain their position purely through lack of choice but it has often crossed my mind that a much better solution would be a consortium of similar minded tech companies who function as their own club that administer and provide their own financial services to each other.

More Stories By Jim Liddle

Jim is CEO of Storage Made Easy. Jim is a regular blogger at SYS-CON.com since 2004, covering mobile, Grid, and Cloud Computing Topics.

@CloudExpo Stories
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of ...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...