Prevent Fraudulent Activity for Online Banking on IBM Db2®
Share This!
Copy link to clipboard
Email link
Print
Situation
A European bank provides online account access to its customers for a banking application that runs on an IBM z/OS mainframe system. Fraud occurs and is difficult to identify and prosecute. Conspiracy is not sufficient grounds for prosecution in this country.
The intent to commit a crime is not sufficient; the crime must actually be attempted for prosecution. Fraudulent financial activity is increasing in the region, particularly in online banking.
Problem
- This situation was costing the bank a lot of money since it was often unsuccessful in preventing the fraud.
- It was difficult to detect the crime and gather the information to assist authorities. The bank needed a straight-forward method to integrate a Linux-based fraud-scoring application without having to rewrite (or modify) its applications.
Solution
- Use HPE Shadowbase Application Integration to integrate the IBM z/OS banking activity in real-time with a Linux-based fraud-scoring application, to detect and prevent fraud before it occurs.
- Use HPE Shadowbase User Exits (where custom code is embedded into the replication engine) to seamlessly perform the integration.
- Leverage IBM Data Event Publisher (IDEP) and MQ Series for IBM Db2 event extraction, and delivery to the Shadowbase Fraud Interface User Exit Logic.

Figure 1 — The Bank’s Fraud Detection Architecture
Outcomes
- Reduces costs from fraudulent activity
- Enables the bank to demonstrate actual, attempted fraud (with the HPE Shadowbase User Exit Logic)
- Simplifies identifying crimes, using the online fraud-scoring application, and denies authorization for suspicious activity
- Helps stem the problem by increasing prosecution and conviction rates
- Avoids having to install any HPE Shadowbase components on the IBM mainframe environment
HPE Shadowbase Product of Interest
- HPE Shadowbase Basic Application Software 1-8 core or 9+ core (WSA51V6T1/T2; BE457AL*)
*As of August 2025, the WSA SKUs have been recreated as “BE” SKUs. Please contact your HPE account representative or Gravic for more information.
Contact us or your HPE Shadowbase representative, and learn how Shadowbase software will benefit you.
Further Reading
Related Case Study:
Winning the Battle Against Internet Banking Fraud by Leveraging Real-Time Data and Application Integration
Related White Paper:
HPE Shadowbase Streams for Application Integration
Related Solution Briefs: