Real-Time Fraud Detection and Resolution for Financial Switch
Figure 1 — HPE Shadowbase Active/Active Architecture for a Financial Message Switch
One of the largest U.S. processors of credit card transactions provides transaction authorization and settlement services on a pair of HPE NonStop systems. The processor is running in an active/active HPE Shadowbase business continuity (BC) architecture (Figure 1).
Fraudulent transaction activity was increasing and costing the processor a great deal of money. The processor needed to integrate real-time fraud detection into its transaction authorization services to identify suspicious activity. Directly modifying the authorization application processing would involve extensive and complex changes and require a lengthy testing cycle.
Use HPE Shadowbase Data and Application Integration to bi-directionally integrate the authorization activity in real-time with an off-platform fraud detection solution from Fair Isaac (Figure 2).
Figure 2 — HPE Shadowbase Active/Active Architecture with Real-Time Fraud Detection
- Identifies and suspends suspicious transactions before authorization occurs
- Dramatically reduces costs of fraudulent activity
- Integrates the NonStop-based authorization application with the Linux-based fraud detection solution without requiring code changes to either
- Supports the processor’s BC architecture and improves system scaling by integrating with multiple geographically-dispersed fraud detection systems
HPE Shadowbase Products of Interest
- HPE NonStop Shadowbase Basic Data Integration Software (BE443AC/QSA51V6)
- HPE NonStop Shadowbase Advanced Data Integration LTU (BE444AL/QSA52V6)
- HPE Shadowbase Basic Application Software 1-8 core or 9+ core (WSA51V6T1/T2)
- HPE Shadowbase Basic Application Software LTU 1-8 core or 9+ core (WSA52V6T1/T2)
Contact us or your HPE Shadowbase representative, and learn how Shadowbase software will benefit you.
Case Study: Payment Authorization — A Journey to Continuous Availability