Welcome!

News Feed Item

Nedbank Implements Entersekt’s Online Card Purchase Authorization Technology to Enhance Internet Fraud Protection

With EMV’s continued expansion overseas and impending adoption in the U.S., fraudsters are turning away from scamming physical credit and debit cards and instead setting their sights on the card-not-present space online. In an effort to further protect its customers from potential fraud online, South African-based Nedbank has partnered with Entersekt, an innovative pioneer in transaction authentication, to integrate the solution provider’s Online Card Purchase Authorization technology into the bank’s Approve-it system. Approve-it is an implementation of Entersekt’s interactive transaction authentication technology, and since the launch of Approve-it on Nedbank’s online banking channel, Nedbank has published a 99% drop in phishing attacks on this channel.

Given the success of Approve-it on the online banking channel, Nedbank is leveraging Entersekt’s unique Online Card Purchase Authorization technology to expand the protective reach of Approve-it to the card not present channel. Approve-it now also serves as an enhanced security feature to allow Nedbank’s customers to authenticate online card purchases directly through their personal mobile device. When a Nedbank customer performs a 3-D Secure online purchase with their card, they will receive a push message via their mobile device requesting them to authorize the transaction with a simple “Accept” or “Reject” response. Not only does this enhance the customer experience by eliminating the need to remember complex static passwords or retyping one time passwords generated on a token, but the security of the online payments channel is significantly increased as well.

“Despite the clear vulnerabilities one time passwords present, many financial institutions continue to rely on this method of customer authentication before a transaction can be completed,” said John Bestbier, Group Executive: Strategy at Nedbank. “Rather than requiring our customers to enter static passwords or one time passwords that can easily be stolen or intercepted by online fraudsters, partnering with Entersekt enables us to leverage advanced authentication capabilities to streamline the approval process by utilizing the customer’s mobile to complete the purchase with a simple touch of a button. With no password to retype anymore, there is no password left for an online fraudster to steal.”

Designed to serve as an added layer of security for online card purchases, 3-D Secure has been proven to lower instances of card not present fraud, but has widely been dismissed by financial institutions due to the annoyances it presents consumers, such as difficulty with activation and inconsistent methods of authentication. Entersekt’s Online Card Purchase Authorization reinvents the 3-D Secure user experience by allowing consumers to authenticate purchases through their mobile device with the touch of a button.

“While there were definite short comings initially associated with 3-D Secure, we saw major potential for the standard to significantly impact transaction security once the consumer objections were fully addressed,” said Christiaan Brand, chief technology officer for Entersekt. “By abandoning reliance on passwords and instead leveraging the user’s mobile device for authentication, we are able to reduce abandonment rates for online purchases and streamline the authentication process to satisfy consumer demands and 3-D Secure standards simultaneously.”

About Nedbank

Nedbank Group is one of SA’s four largest banking groups by assets and deposits, with Nedbank Ltd our principal banking subsidiary. We are a JSE Top 40 company with our ordinary shares listed on the JSE since 1969 and on the Namibian Stock Exchange since 2007. Our market capitalisation was R107bn at 31 December 2013. Old Mutual plc is our majority shareholder, owning 52% of Nedbank Group. Headoffice in Sandown, Sandton, Johannesburg, SA.

About Entersekt

Entersekt is an innovative pioneer in transaction authentication. The company’s one-of-a-kind approach combines the power of electronic certificate technology (PKI) with the convenience of mobile phones and encrypted cloud messaging to provide financial institutions and their customers with full protection from online banking fraud. With its patented security products authenticating millions of transactions globally, none of Entersekt’s clients have experienced a successful phishing attack on their systems since implementing the company’s technology. Financial institutions worldwide look to Entersekt to strengthen the all-important bond of trust they share with their customers, and to build on those relationships by introducing increasingly innovative mobile and online banking services. For more information on Entersekt, visit www.entersekt.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...
SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Avere delivers a more modern architectural approach to storage that doesn’t require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbuilding of data centers ...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies adopt disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevO...
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
SYS-CON Events announced today that AppNeta, the leader in performance insight for business-critical web applications, will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. AppNeta is the only application performance monitoring (APM) company to provide solutions for all applications – applications you develop internally, business-critical SaaS applications you use and the networks that deli...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
SYS-CON Events announced today that FalconStor Software® Inc., a 15-year innovator of software-defined storage solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. FalconStor Software®, Inc. (NASDAQ: FALC) is a leading software-defined storage company offering a converged, hardware-agnostic, software-defined storage and data services platform. Its flagship solution FreeStor®, utilizes a horizonta...