sb-nz logo
Story image

Kiwi partnership keeping a 'vigilant' eye on fraudsters

26 Jun 2018

The University of Waikato and fraud detection software firm Vigilance are working together on a way to create a fraud detection tool that can spot data anomalies in a faster and more accurate way.

University data scientists have been working on their own tool to analyse data, but now the combination of Vigilance technology will enable the partners to build a full fraud detection solution.

Vigilance chief executive officer Sam MacGeorge says the tool is able to provide analysis through the use of infographics, which means it’s easier to guide customers through anomalies or suspicious activities generated from transactional data. It can also rule out false positives.

"While some systems claim to be using artificial intelligence (AI) to analyse transactions, this is the most sophisticated tool available in New Zealand,” comments MacGeorge.

“Categorising data accurately is at the forefront of accurate machine learning. This new tool has given us a better lens to analyse large quantities of a customer’s data and unusual patterns of behaviour much faster.”

University of Waikato researcher Dr Ryan Ko is one of the security experts behind the $12.2 million government-funded STRATUS programme.

The programme is a six-year cybersecurity project funded by the Ministry of Business, Innovation and Employment (MBIE) and driven by a number of security and practitioners from the University of Waikato, University of Auckland, Unitec Institute of Technology and Cloud Security Alliance. 

It aims to create a suite of security tools, techniques, and capabilities that return data control back to cloud computing users.

“The outputs will help empower users to be able to control the security of their data in the Cloud and give companies tools and services to sell,” comments Ko.

“Vigilance is one of the first companies we have worked with that has used the Anomalies Detection Framework and then gone on to further expand its capability for its own fraud detection and AML purposes.”

The initial framework, along with other tools for privacy of data during processing and storage, has potential applications in many fields outside financial data, and the University of Waikato is working with other partners to commercialise it in those fields.

Vigilance describes itself as a software as a service (SaaS) that ensures robust payment review and authorization processes exist within your organisation, thereby minimising the risk of financial loss.

The software operates in real-time to identify questionable payee and bank information at the point proposed payments are being prepared for final approval. This catches any tampering prior to this point and leaves no time for fraudsters to change information at the last minute during the approval process.

Link image
What's new in Genetec Security Center 5.9
The platform supports physical security that empowers organisations with greater situational awareness.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
Got crypto? Pay tax – A quick look at IR's new crypto-asset guidance
Inland Revenue's new guidance aims to provide more certainty for New Zealand taxpayers who hold crypto-assets, and to help people ‘get things right from the start’.More
Link image
Webcast series: The necessary tools to secure a remote workforce
Experts from across the A/NZ region discuss the best security practices in a remote working world - with sessions available on the first Thursday of every month.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More