Aci PRM
Aci PRM
Redguides
for Business Leaders
Financial services institutions face a variety of challenges in the area of cybercrime. The risk
is not limited to direct fraud losses either. Financial crime also affects an institution’s ability to
protect and retain customers, and makes it more difficult to comply with complex national and
international reporting requirements.
Even while the amount of fraud is on the increase, the forms that it takes are continually
changing as fraudsters become more clever at inventing schemes and exploiting technology.
Staying ahead of the criminal element is a daunting task for fraud managers. The challenge is
further complicated by the trend within the financial sector to constantly add delivery channels
and increase the products and services offered to customers. That trend, combined with the
common occurence of mergers and acquisitions, tends to increase the complexity of the IT
landscape in which fraud monitoring must take place and is often mirrored within fraud
departments, where different teams and systems deal with different types of fraud and
different lines of business. The lack of a comprehensive view of each customer’s activity
across all channels makes the detection of abnormal (fraudulent) transactions more difficult.
ACI Proactive Risk Manager is an enterprise fraud management solution that helps financial
institutions detect and react to fraud. It gives users the ability to be as fast and agile in
responding to fraud as the criminals are in committing it. Proactive Risk Manager uses
sophisticated analytics, easily configured by the user, to target fraud with precision, prioritize
alerts, and manage fraud cases. It can be integrated with a vast number of backend systems
and processes, provides a holistic view of customer activity.
IBM® System z® is an ideal platform on which to run ACI Proactive Risk Manager. System z
offers the performance, security, scalability, and configurability to support and enhance PRM’s
capabilities. System z already has earned a prominent place in the financial services sector;
many financial institutions use it to run their core banking transaction systems. PRM easily
exploits the strengths of System z.
This guide provides details about how ACI Proactive Risk Manager on IBM System z can help
you to meet the challenge of enterprise fraud management. The two companies each bring a
proven track record to this effort, and their combined expertise is unmatched.
Financial institutions face common challenges in today's rapidly changing risk landscape.
How do you best protect customer relationships from fraud, especially given the number of
third-party data breaches, phishing incidents, and malicious code attacks? How do you
identify complex cross-channel fraud and stop it quickly? How do you prevent payment fraud
in real time before losses occur?
These are daunting tasks for many fraud managers, and the challenge is intensified by the
fact that most financial institution fraud departments remain in silos. Typically, financial
institutions have supported each new delivery channel and, sometimes, each new product or
service, with its own fraud system, often on its own IT infrastructure. This, combined with the
recent flurry of M&A activity, has meant that banking systems can be a confusing mixture of
different application systems and technologies. This approach has been mirrored within fraud
departments where different teams and systems deal with different types of payment fraud.
Card fraud teams are often isolated from teams dealing with other types of fraud conducted
via different payment tools or access points - such as Internet banking, ACH, or wire.
This chapter addresses trends in enterprise fraud management, including why now, more
than ever, financial institutions are turning to an integrated risk management framework to
better protect customers from fraud.
By targeting their attacks across banking silos, fraudsters have been able to evade many
traditional fraud detection countermeasures. And, by striking quickly, many fraud rings are
scamming financial institutions out of millions of dollars in a matter of minutes.
Not only does an increase in financial crime impact the bank in terms of direct fraud losses, it
also impacts their ability to retain customers. A 2009 ACI Worldwide survey of more than
2,400 consumers across eight countries found that if an individual or someone they knew was
impacted by fraud, 22 percent would change financial institutions, and an additional 27
percent would consider changing financial institutions. For information on the survey results,
and to download a guide on stopping card fraud, refer to the following Web site:
http://www.aciworldwide.com/stopcardfraud
In order to protect themselves and their customers against potential fraud attacks, financial
institutions need to find ways of implementing more effective anti-fraud strategies while
increasing efficiency and keeping costs to a minimum.
One obstacle to efficiency usually takes the form of individual silos for different payment
channels and types, such as check and card, performing similar functions. This approach,
illustrated in Figure 1 on page 5, leads to an inefficient use of technology, applications, and
staff across the organization.
With a centralized enterprise fraud management strategy, financial institutions can better
integrate siloed hardware and software fraud systems to reduce the risk of fraud while
benefiting from more efficient operations.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 4
Payment Systems
ACH Card
Check
Wire
Core Systems
POS
DDA
ATM
Channels
Branch
G/L
Phone
Online Reconciliation
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 5
Is the system reliable and available during global banking hours and during known peak
periods?
Proven expertise
Is the system proven in handling high-volume card, ACH, check, and wire activity
occurring at a POS, ATM, branch, by phone, and online?
Does the solution provide a strategic framework for payment processing and payments
security?
The next chapter provides details on how PRM addresses the trend toward increased fraud in
the financial services sector and heightened customer requirements to reduce losses due to
fraud exposures.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 6
How ACI Proactive Risk Manager
addresses financial crime trends
In this chapter, we introduce the ACI Proactive Risk Manager solution, which is used by more
than 150 customers worldwide, including half of the top 20 global banks. ACI Proactive Risk
Manager helps financial institutions, card issuers, processors, and merchant acquirers detect
suspicious activity that may impact their customers' accounts, and stop fraud from occurring
in real time.
Through its custom neural network technology, ACI Proactive Risk Manager compares the
characteristics of each customer's activity with the custom fraud model and recorded patterns
of behavior for every account holder it sees. It then assesses and scores the risk in real time
or near real time for each transaction using a variety of advanced algorithms, parameters, and
accumulated statistics. In addition, ACI Proactive Risk Manager provides reviewers with
precise reasons for the score, improving transaction analysis.
ACI Proactive Risk Manager interfaces with a number of ACI Worldwide products, including
the ACI Automated Case Management System, BASE24, BASE24-eps and the ACI Money
Transfer System. Proactive Risk Manager also integrates with any authorization and bank
host system.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 8
PRM analysis and review system
– Flexible scripting engine
• Real-time fraud prevention or near-real-time detection
– User interface and historical database
• Client access - Robust enterprise-wide demographics data, Web-enabled Graphical
User Interface (GUI)
• Workflow management and managerial controls
– Enables extensibility to external systems
Money
Neural Model
Transfer
Automated
Custom
System Credit
Card
Post-
Sources
ACH
Manual Analysis
and Review
Customers can write rules that evaluate neural scores, transaction conditions such as
countries, MCC codes, entry types, and so forth. If necessary, customers can choose to have
some of their rules automatically block highly suspicious activity until an analyst has a chance
to review it. Additionally, Proactive Risk Manager users can keep up with evolving fraud trends
by deploying rules on the fly.
Rules can also reference customer profile tables, which could be used to capture data such
as preferred ATM locations, frequency of cross-border activity, largest ATM withdrawal
amount, historical online usage patterns, and so forth. One ACI Worldwide customer utilized
customer profiling to reduce alerts by 40% while increasing their fraud detection rate to 85%.
ACI Proactive Risk Manager provides the ability to analyze common point of purchase activity
for fraudulent transactions and determine point of compromise locations. Once a point of
compromise is detected, analysts can take proactive steps to block or watch future activity.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 9
ACI Proactive Risk Manager users have realized significant operational efficiencies enabling
them to prioritize and analyze alerts faster - increasing the capacity of fraud cases worked by
optimizing existing fraud resources, while lowering overall fraud losses and associated
handling costs. One top five bank in the U.S. reported a 66% decrease in keystrokes,
enabling their analysts to increase the efficiency of working fraud alerts and cases, reducing
overall fraud losses.
The ROI for ACI Proactive Risk Manager is built on these three components:
Stopping more fraud faster through system agility, more granular rules, customer profiling,
and real-time blocking.
Improving analyst efficiency, thus enabling each analyst to work more fraud cases, and
prioritizing alerts more effectively to resolve the most risky cases sooner.
Reducing costs by consolidating siloed fraud detection systems and by moving from an
expensive consortium neural net to an effective custom neural network.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 10
Benefits of running the PRM solution on
IBM System z
Financial institutions are focusing more and more on consolidation and integration of
resources to save money (cut costs), prevent fraud, reduce risk, protect customer loyalty and
brand image, and comply with regulatory agencies. There are real benefits in terms of costs
savings, improved efficiencies, and growth flexibility for financial institutions that consolidate
their fraud management framework onto a centralized enterprise fraud management system
hosted on the enterprise-scale IBM System z mainframe.
The same benefits that characterize PRM—system agility, operational efficiency, scalability,
high performance, a proven track record, and excellent return on investment—also apply to
the System z platform. This chapter describes specifically how the key features and strengths
of System z map to the demands of ACI Proactive Risk Manager.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 12
An important part of the value proposition of the IBM-ACI Worldwide strategic alliance is
the integration of every aspect of the retail payment operations on IBM System z. Unlike a
distributed platform, IBM System z provides the unique capability of combining switching,
routing, and risk analytics on a single platform, as shown in Figure 4 on page 13. PRM
and BASE24-eps, when collocated on the same System z, leverage the IBM Coupling
Facility to share the data and message passing queues among Sysplex images.
Collocating PRM and the data on the same system as BASE24-eps can enable fast and
real-time detailed analysis of transactions to be performed before the final authorization is
transmitted. Also, additional rules and models can be applied to the real-time transaction
to detect fraud. In addition, there is incremental value in integrating payments and fraud
management together on a single platform, as shown in Figure 5 on page 13 where the
linked tables not only eliminate most file transfer (simplicity) but also facilitate real-time
analysis (risk reduction).
yAuthorize Scoring
ATM
Engine
yReal time risk Rules
assessment Engine yBatch
yRouting yReal time
Other
yStand-in (100%)
Settlement Analytics
Fraud & Straight Liquidity Disputes
Switching Proactive Risk Through Management Management
BASE24-eps Manager Clearing Processing
linked tables
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 13
another platform and still receive benefit. For clients currently operating on BASE24
“classic” who require enterprise fraud monitoring with PRM (Figure 6 on page 14), there
are benefits from connecting the BASE24 classic payment engine to PRM on IBM System
z. When using this configuration, PRM retains collocation access to clients’ and “system of
record” databases, and the financial institution still exploits, the advantages of the System
z data sharing, high availability, and information management middleware capabilities. The
resource sharing capability and scale of the IBM System z enable the client to begin
migration to BASE24-eps on System z and benefit from the advantages of collocation with
PRM.
yAuthorization
yRouting High Availability
yStand-in Continuous Operations
ACI ACI
Proactive Proactive
Risk Manager Risk Manager
Distributed Processor(s)
IBM
Coupling
Facility
DB2 for z/OS DB2 for z/OS
ACI PRM uses IBM DB2® database products for storing its own data. In most large
financial institutions business data for most channels is kept in DB2 databases on IBM
System z. When combining the performance of IBM System z with PRM and a DB2
database, financial institutions are positioned to carry out data analysis and data mining to
explore new sources of fraud risk. The enhanced performance achieved by running PRM
and DB2 on the same physical system reduces I/O latencies significantly by utilizing
memory-to-memory transfer of data at the same time that analytics are being performed
on the data. This fast and efficient processing, illustrated in Figure 7, reduces the standard
window of time to authorize a valid transaction.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 14
IBM and ACI products are tightly integrated to achieve scalability, flexibility and efficiencies
LPAR(s)
Transaction Real Time Scoring
Data Real Time Rules
ICE-XS
Near Real
Time Scoring
Back Office PREVENTION
CONTEXT CONTEXT
PRM
N
Shared Memory Shared Memory
Payment
IO
AN
MIS
CT
A
LY
Settlement
TE
S IS
DE
System
Integrated Near Real
Server (IS) Time Rules
Case Queue
BASE24-eps Management Management
Because the goal is to get the most complete view of related information possible to
assess risk, the additional ability to integrate batch processing into the PRM process can
help maximize enterprise fraud detection. IBM System z can prioritize and assign
resources for the batch workload to meet critical batch windows that are synchronized with
real-time and near-real-time priorities so that these processes operate as a single entity.
When analysis of daily, weekly, monthly, or quarterly activity is required, the IBM System z
batch capability provides reliable, high-performance access to massive DB2 database
content.
Incremental workloads or new applications can easily be added to an already running
System z configuration. IBM System z is built to share many different workloads on one
physical machine and balance these workloads according to Service Level Agreements
(SLAs) agreed upon with the Line of Business organizations. Leading edge virtualization
capabilities on System z, along with dynamic resource allocation, provide financial
institutions with the flexibility to direct processing capacity to specific business applications
when and where it is needed. This is especially important in financial environments, where
a higher number of transactions can very quickly lead to changes in business operations
because of increasing fraud analysis and detection.
The ability to create virtual machine images which comply with EAL5 security facilitates
rapid development, migration, and deployment, with extremely secure isolation between
independent workloads supporting reduced exposure to internal risk of fraud. This
prioritized resource sharing of System z for migration/development/test/production usage
eliminates the need for multiple servers, software, networking, support staffing, and facility
investments, and the associated costs, and can help fraud managers implement whatever
range of system extensions are deemed necessary to improve risk analysis.
With energy prices and consumption constantly rising, the cost of meeting the total energy
requirements of data centers becomes an increasingly significant component of the IT
budget. Limited and expensive space in data centers and the propagation of hotspots also
can constrain the IT budget. Financial institutions can achieve energy and space savings
by consolidating applications running on low utilization (white space) distributed servers
and moving them to a centralized System z. In addition to the cost savings from reduced
energy consumption and space requirements, consolidation also saves money by
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 15
enabling reductions in network infrastructure, system management staffing, and software
licensing costs.
The System z heritage of managing shared resources among multiple diverse workloads
makes it feasible to leverage the investment in an existing System z installation by adding
appropriate incremental resource to support PRM. This would complement the data
sharing and inter-process latency mainframe advantages while eliminating the possible
need to acquire an entirely new IT server, software, facilities, and operations staff. With a
balanced system design supporting utilization rates of up to 100%, System z is an
attractive platform for workload consolidation at a low cost of ownership.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 16
Full Near Real Time Processing Environment Dual LPAR
MIPs
Figure 8 Full near real time processing benchmark results in a dual LPAR
The fraud manager has more flexibility in rule writing because the financial institution can
increase the length of time historical transactions are stored in the highly scalable DB2 on
z/OS® database. Thus the financial manager can increase the suggested real time “short
window” retention to a longer period. This provides an extended analysis window which, in
turn, means a deeper analysis of historical behavior is possible. Additionally, horizontal
capacity scaling can be added non-disruptively by exploiting DB2 on z/OS data sharing
and Parallel Sysplex. Unlike partitioned databases required for very large databases on
distributed servers, DB2 on z/OS does not require repartitioning to add images. In
addition, hot spots in processing due to data affinity are avoided because of the Parallel
Sysplex “shared everything” design, which allows workloads to be executed anywhere
within a Sysplex.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 17
The financial institution should have the flexibility to adjust the amount of real-time
transaction monitoring that is done, thus avoiding the need to buy excess server capacity
for “just in case” peak processing and ending up with unused and costly server white
space. The System z “just in time” capacity lets the financial institution dynamically and
non-disruptively upgrade processor capacity to handle traffic spikes and to assign the
additional capacity to the fraud process. This additional capacity can be a temporary cost,
paid for in daily increments or extended into a permanent capacity upgrade at the user’s
discretion. These Capacity on Demand options to permit “just in time” dynamic addition of
computing power and memory can respond to transaction and workload fluctuations, with
a variable cost structure, without service interruption. This feature helps when you need
capability to analyze a higher percentage of transactions in real time or when more models
and rules need to be applied to the transactions to detect fraud patterns.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 18
IBM System z (z/OS)
WebSphere WebSphere
MQ MQ
WebSphere MQ
Client Reply SE-Reply Client Reply
Analytic Analytic
Scoring Scoring
Gatrway Gatrway
Engine WebSphere MQ
Engine
SE-Rqst
WLM WLM
Request Storage
(RAID0/5)
Response
PRM on z/OS with DB2 is the only platform on which system-wide clustering can provide
continuous availability for PRM. Failover techniques on other platforms claim the ability to
mask or minimize the impact of unplanned outages, but DB2 on z/OS with Parallel
Sysplex, as shown in Figure 11 on page 20, is designed to also support continuous
operation through scheduled events such as hardware and software maintenance or
replacement, eliminating exposure to reduced service or fraud detection levels. DB2 also
provides the ability to reorganize files and journals online, thus eliminating the need to
interrupt real-time fraud processing for scheduled database maintenance activity such as
incrementing database table space to support additional traffic. These continuous
operation features are critical for effective 24x7 enterprise fraud management.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 19
Network Access
ACI ACI
BASE24-eps Proactive BASE24-eps Proactive
Risk Manager Risk Manager
IBM
Coupling
Facility
DB2 for z/OS DB2 for z/OS
HyperSwap
Metro Mirror
Storage A Storage B
(RAID0/5) (RAID0/5)
DB2 for z/OS (the PRM data store) has multi-level security, providing different access
levels/lists support that can be applied to data at a row level; this granularity reduces the
potential for employee fraud and cover up.
The z/OS encryption facility encrypts data at rest, the IBM TS1100 tapes support data
encryption for archive and tape interchange data, the IBM DS8000® System Storage™
encrypts data on disks and the on chip cryptographic functions, and Crypto Express
co-processors of System z provide a sound foundation for data protection.
Running an ACI payment engine on System z, such as BASE24-eps, authorization latency
is reduced since the applications take advantage of System z integrated cryptography,
eliminating the need for external network-attached encryption devices.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 20
IBM System z capabilities. IBM System z is the reference platform for these ACI
Worldwide products.
System z has long been known for its exceptional total cost of ownership benefits and
operational characteristics of large volume transaction processing, large scale database
management systems, and unparalleled system security and reliability. The proven
System z infrastructure can support extremely high volumes with integrity. For example,
the Financial Network Services (FNS) core banking benchmark achieved 9445
transactions per second against a 380 million account DB2 database.
There are System z customers with Parallel Sysplex clustering who have been operating
without disruption for over a decade—despite changing hardware infrastructures and
implementing multiple software and application upgrades. IBM continues to improve the
performance and scalability of the System z mainframe so technology keeps pace with
changing business requirements. These unparalleled strengths enable financial
institutions using System z to analyze a higher volume of near-real-time transactions and
a higher percentage of transactions in real time.
ACI Worldwide currently has over 2500 institutions protected by PRM. A number of
processors around the world are utilizing PRM to protect against and manage fraud on
behalf of other financial institutions, and half of the top 20 global banks utilize the solution.
More than 800 customers around the world rely on ACI Worldwide solutions to process
payments, manage risk, automate bank office systems, and provide application
infrastructure services.
Benefits summary
The implementation of PRM functionality combined with the strengths of IBM System z
provides financial institutions the ability to address the trends and challenges they are facing
in today's volatile payments environment. With PRM on a System z, financial institutions can
take an enterprise view of payments transactions to quickly address potential threats and
comply with increasing worldwide government regulatory requirements, while reducing their
cost per transaction.
Combining the industry leading workload management, resource sharing, availability and
high performance transaction processing pedigree of System z, with its integration
efficiencies to leverage coexisting application and database assets, the PRM solution
becomes the obvious choice to provide better informed, cost-effective, real-time multichannel
enterprise fraud protection that the financial sector demands.
ACI Worldwide and IBM are ready to help financial institutions fight fraudulent activities
across all payment channels with proven solutions such as PRM running on IBM System z.
The goal is not just to combat fraud, but to reduce operating costs while providing analysts
with the tools to help the financial institutions mitigate fraud risks.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 21
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 22
Experience the solution now
It is said that seeing is believing. A quick way to start seeing the power of an IBM System z
based PRM enterprise fraud solution is to talk to your ACI Worldwide or IBM representatives.
They can provide literature, an onsite demonstration, and a video discussion to help you learn
more about this solution. They can also arrange to have you attend a “Smart Bank” showcase
and assist you in locating and accessing additional resources.
Video
The video Improving Speed & Efficiency in Payment Fraud Management can be viewed at the
following Web site:
http://www.aciworldwide.com/igsbase/igstemplate.cfm?SRC=DB&SRCN=&GnavID=79
Industry experts from featured analyst firm Gartner, Inc., ACI Worldwide, and IBM examine
the growing importance of speed and efficiency within fraud management and provide insight
into how leading financial institutions are managing fraud and risk across the enterprise in
real time.
Additional capabilities can be shown using the product’s desktop user interface.
A sandbox environment is available via a remote connection from anywhere in the world. The
testing period is usually up to a three weeks per project, but longer periods are negotiable.
This is typically a customer funded engagement and is staffed by ACI Worldwide, IBM, and
customer resources who use the sandbox to build a more tailored demonstration to match
specific requirements. A sandbox could also be used for things like training or for services
projects to help expedite the installation process.
It is also important to note that customers can implement such a configuration to monitor the
transactions and prevent fraud today. The Smart Bank showcase implementation is one of the
many real customer integration scenarios that can be used to rapidly deploy such a solution
at a financial institution. The ACI Worldwide and IBM strategic alliance can provide seamless
collaboration services to help customers accelerate the selection and implementation of an
enterprise-wide risk management framework to prevent fraud as soon as possible.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 24
IBM's Global Services organization represents a key value-add in offering customers
end-to-end total solutions including consulting, legacy systems integration, custom
capabilities, and ongoing support for large-scale processing needs. This complements the
application-level services ACI Worldwide provides to implement PRM. Together, ACI
Worldwide and IBM offer an unparalleled comprehensive solution in the e-payments
space.
Additional resources
As leading technology providers of financial services solutions, IBM and ACI Worldwide offer
expertise in protecting financial institutions and their customers from fraud. The solution
brochure IBM and ACI Worldwide - Providing Enterprise Fraud Solutions for Retail and
Wholesale Payments provides additional background on an enterprise approach to fighting
fraud, the importance of real-time fraud detection, and highlights of IBM and ACI Worldwide
enterprise fraud solutions. It can be found at:
http://www.ibm.com/industries/financialservices/us/detail/resource/M833021I37699B40.html
ACI Proactive Risk Manager has been optimized for System z. This powerful combination
enables banks to take an enterprise view of payment transactions with the flexibility to quickly
respond to new sources of potential fraud. Banks and other financial institutions will be able to
monitor transactions in near real time even as transaction volumes grow. Selected high
priority transactions can be monitored in real time to further reduce the risk of fraud losses.
The solution brochure Improving Payments Fraud Detection and Prevention: ACI Proactive
Risk Manager with IBM System z10 provides additional information on the benefits of the
mainframe for enterprise fraud detection and prevention. It can be found at:
http://www.ibm.com/common/ssi/fcgi-bin/ssialias?infotype=PM&subtype=BR&appname=ST
GE_ZS_ZS_USEN_&htmlfid=ZSB03024USEN&attachment=ZSB03024USEN.PDF)
IBM announced the System z Solution Edition Series to help customers deploy new
enterprise workloads such as electronic payments. This program reflects an ongoing strategy
to enable customers to run a much wider range of their business activities on System z while
taking advantage of the powerful reliability, efficiency, transaction processing and
management capabilities of the platform. Further information on these offerings, including the
System z Solution Edition for ACI, is available in the press release at the following Web site:
http://www.ibm.com/press/us/en/pressrelease/28181.wss
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 25
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 26
Summary
The financial impact of fraud is increasing for banks worldwide. Fraud attacks and data
breaches are costly, not only in terms of reputation and loss of revenue, but also in the
administrative costs of restoring customers’ accounts and reporting exposures to regulatory
agencies. Banks are also required to keep an increasing amount of capital reserve for fraud
losses. All of these issues are placing a greater internal focus on enterprise risk
management.
This guide also helps you understand the current worldwide payment channels changes,
trends, and challenges, including the importance of accepting that fraud losses are becoming
a key concern for financial institutions due to large sums of money already lost because of
fraudulent transactions.
Alex Louwe Kooijmans is a project leader with the International Technical Support
Organization (ITSO) in Poughkeepsie, NY, and specializes in SOA technology and solutions
on System z. He also specializes in application modernization and transformation on z/OS.
Previously he worked as a Client IT Architect in the Financial Services sector with IBM in The
Netherlands, advising financial services companies on IT issues such as software and
hardware strategy and on demand. Alex has also worked at the Technical Marketing
Competence Center for zSeries® and Linux® in Boeblingen, Germany, providing support to
customers starting up with Java™ and WebSphere® on System z. From 1997 to 2000, Alex
completed a previous assignment with the ITSO, managing various IBM Redbooks® projects
and delivering workshops around the world in the area of WebSphere, Java, and e-business
technology on System z. Before 1997 Alex held a variety of positions in application design
and development, product support, and project management, mostly in relation to the IBM
mainframe.
Rob Haake is responsible for product marketing for ACI's financial crime management
products. Rob also serves as the President of the Americas ACI Customer Exchange (ACE)
Risk Advisory Committee. Rob joined ACI Worldwide in May 2008 and has over eight years
payment industry experience. Prior to joining ACI Worldwide, Rob led channel and product
marketing efforts for First Data Corporation's national financial institutions segment. Rob
holds an MBA from Regis University and a Bachelor of Arts from Creighton University.
Jim Goethals is currently an infrastructure architect with IBM in Raleigh, North Carolina. He
has worked at IBM for 40 years, 26 of which were in product marketing, where Jim was
responsible for multiple IBM hardware and software products. His current position in the IBM
Banking Center of Excellence deals with retail payments and core systems transformation to
help clients accelerate their move to smarter banking on a dynamic infrastructure. His other
areas of expertise include networking and transaction processing on large systems.
28 Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z
Ethel Richardson has over 25 years of experience with IBM mainframes. She is a graduate
of Vassar College in Poughkeepsie, New York with a Bachelor's Degree in Mathematics. She
also holds a Masters Degree in Systems and Information Science from Syracuse University in
Syracuse, New York. Ethel has contributed to several publications related to the financial
services sector and the value of the mainframe.
Dino Quintero is a project leader with the International Technical Support Organization
(ITSO) in Poughkeepsie, NY. His areas of expertise include continuous availability planning
and implementation, enterprise systems management, virtualization and clustering solutions.
Stephane Faure, Robert Easter, Ken Muckenhaupt, John Crooks, Michael Onoufriou,
Lorilee Lang
IBM
Summary 29
30 Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not give you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.
®
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries, or
both. These and other IBM trademarked terms are marked on their first occurrence in
this information with the appropriate symbol (® or ™), indicating US registered or
common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A
current list of IBM trademarks is available on the Web at
Redbooks®
http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
DB2® Redbooks® System z®
DS8000® Redguide™ Tivoli®
HiperSockets™ Redbooks (logo) ® WebSphere®
IBM® System Storage™ z/OS®
Parallel Sysplex® System z10™ zSeries®
PRM is a trademark of ACI Worldwide. ACI and ACI Worldwide are registered trademarks in the United
States, other countries or both.
Java, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other
countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z 32