Click here to close now.




















Welcome!

News Feed Item

Nedbank Implements Entersekt’s Online Card Purchase Authorization Technology to Enhance Internet Fraud Protection

With EMV’s continued expansion overseas and impending adoption in the U.S., fraudsters are turning away from scamming physical credit and debit cards and instead setting their sights on the card-not-present space online. In an effort to further protect its customers from potential fraud online, South African-based Nedbank has partnered with Entersekt, an innovative pioneer in transaction authentication, to integrate the solution provider’s Online Card Purchase Authorization technology into the bank’s Approve-it system. Approve-it is an implementation of Entersekt’s interactive transaction authentication technology, and since the launch of Approve-it on Nedbank’s online banking channel, Nedbank has published a 99% drop in phishing attacks on this channel.

Given the success of Approve-it on the online banking channel, Nedbank is leveraging Entersekt’s unique Online Card Purchase Authorization technology to expand the protective reach of Approve-it to the card not present channel. Approve-it now also serves as an enhanced security feature to allow Nedbank’s customers to authenticate online card purchases directly through their personal mobile device. When a Nedbank customer performs a 3-D Secure online purchase with their card, they will receive a push message via their mobile device requesting them to authorize the transaction with a simple “Accept” or “Reject” response. Not only does this enhance the customer experience by eliminating the need to remember complex static passwords or retyping one time passwords generated on a token, but the security of the online payments channel is significantly increased as well.

“Despite the clear vulnerabilities one time passwords present, many financial institutions continue to rely on this method of customer authentication before a transaction can be completed,” said John Bestbier, Group Executive: Strategy at Nedbank. “Rather than requiring our customers to enter static passwords or one time passwords that can easily be stolen or intercepted by online fraudsters, partnering with Entersekt enables us to leverage advanced authentication capabilities to streamline the approval process by utilizing the customer’s mobile to complete the purchase with a simple touch of a button. With no password to retype anymore, there is no password left for an online fraudster to steal.”

Designed to serve as an added layer of security for online card purchases, 3-D Secure has been proven to lower instances of card not present fraud, but has widely been dismissed by financial institutions due to the annoyances it presents consumers, such as difficulty with activation and inconsistent methods of authentication. Entersekt’s Online Card Purchase Authorization reinvents the 3-D Secure user experience by allowing consumers to authenticate purchases through their mobile device with the touch of a button.

“While there were definite short comings initially associated with 3-D Secure, we saw major potential for the standard to significantly impact transaction security once the consumer objections were fully addressed,” said Christiaan Brand, chief technology officer for Entersekt. “By abandoning reliance on passwords and instead leveraging the user’s mobile device for authentication, we are able to reduce abandonment rates for online purchases and streamline the authentication process to satisfy consumer demands and 3-D Secure standards simultaneously.”

About Nedbank

Nedbank Group is one of SA’s four largest banking groups by assets and deposits, with Nedbank Ltd our principal banking subsidiary. We are a JSE Top 40 company with our ordinary shares listed on the JSE since 1969 and on the Namibian Stock Exchange since 2007. Our market capitalisation was R107bn at 31 December 2013. Old Mutual plc is our majority shareholder, owning 52% of Nedbank Group. Headoffice in Sandown, Sandton, Johannesburg, SA.

About Entersekt

Entersekt is an innovative pioneer in transaction authentication. The company’s one-of-a-kind approach combines the power of electronic certificate technology (PKI) with the convenience of mobile phones and encrypted cloud messaging to provide financial institutions and their customers with full protection from online banking fraud. With its patented security products authenticating millions of transactions globally, none of Entersekt’s clients have experienced a successful phishing attack on their systems since implementing the company’s technology. Financial institutions worldwide look to Entersekt to strengthen the all-important bond of trust they share with their customers, and to build on those relationships by introducing increasingly innovative mobile and online banking services. For more information on Entersekt, visit www.entersekt.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 17th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Com...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Scrum Alliance has announced the release of its 2015 State of Scrum Report. Almost 5,000 individuals and companies worldwide participated in this year's survey. Most organizations in the market today are still leading and managing under an Industrial Age model. Not only is the speed of change growing exponentially, Agile and Scrum frameworks are showing companies how to draw on the full talents and capabilities of those doing the work in order to continue innovating for success.
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at @DevOpsSummit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, presented a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mocku...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
Graylog, Inc., has added the capability to collect, centralize and analyze application container logs from within Docker. The Graylog logging driver for Docker addresses the challenges of extracting intelligence from within Docker containers, where most workloads are dynamic and log data is not persisted or stored. Using Graylog, DevOps and IT Ops teams can pinpoint the root cause of problems to deliver new applications faster and minimize downtime.
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.