Unlike other anti-fraud vendors that require the customer to provide the data for analysis (typically from log files and data warehouses), Intellinx provides a much more comprehensive and effective fraud management solution, covering a wide range of functions, from comprehensive data capture to analytics and investigation tools. The data capture is performed both in the traditional way (analyzing log files and data warehouses) and through patented non-invasive capture of user activity data by sniffing network transmission between end-users and servers. This enables organizations to capture internal and external user activity, including user queries, which are typically not included in existing log files, and therefore cannot be monitored by other anti-fraud solutions.
The Intellinx system is highly flexible and is typically implemented much faster than other anti-fraud systems, providing multiple solutions on the same platform. It allows the customer to control all system aspects including data models, business rules, scoring models, screen layouts, reports, dashboards, workflows, alerts, cases, ETL and link analysis.
|Function||Intellinx||Other Anti-Fraud Solutions|
|Data Capture||Monitors all business activity, from the network, logs, transaction files and Data Warehouse||Monitoring is limited to logs, transactions files and Data Warehouse|
Note: Other anti-fraud solutions may be able to detect the last two, only if online banking log files contain this level of detail. Many don’t.
Following is a summary of the difference between Intellinx and other Anti-Fraud solutions
|Feature||Intellinx||Other Anti- Fraud Solutions|
|Visibility to Read-only Actions||Yes||Depends on whether the actions are included in existing log files. Typically they are not.|
|Analysis Type||Behavior analysis and Transaction analysis||Transaction analysis|
|Forensic Audit trail||Yes||No|
|Alert Timing||Real time and near-real time||Depends on source data timing, typically offline/ batch|
|Flexibility of Analytic/ Investigative Functions||High, mostly done using point-and-click tools||Medium/ low, often requires coding|
|Adding Controls to Applications||Yes||No|
|Implementation Effort||Out-of-the-Box Record /Replay and Search capabilities||Requires ETL project for capturing data for analysis|
|Initial Implementation Time||Days||Weeks/ months|