Welcome!

News Feed Item

Nedbank Implements Entersekt’s Online Card Purchase Authorization Technology to Enhance Internet Fraud Protection

With EMV’s continued expansion overseas and impending adoption in the U.S., fraudsters are turning away from scamming physical credit and debit cards and instead setting their sights on the card-not-present space online. In an effort to further protect its customers from potential fraud online, South African-based Nedbank has partnered with Entersekt, an innovative pioneer in transaction authentication, to integrate the solution provider’s Online Card Purchase Authorization technology into the bank’s Approve-it system. Approve-it is an implementation of Entersekt’s interactive transaction authentication technology, and since the launch of Approve-it on Nedbank’s online banking channel, Nedbank has published a 99% drop in phishing attacks on this channel.

Given the success of Approve-it on the online banking channel, Nedbank is leveraging Entersekt’s unique Online Card Purchase Authorization technology to expand the protective reach of Approve-it to the card not present channel. Approve-it now also serves as an enhanced security feature to allow Nedbank’s customers to authenticate online card purchases directly through their personal mobile device. When a Nedbank customer performs a 3-D Secure online purchase with their card, they will receive a push message via their mobile device requesting them to authorize the transaction with a simple “Accept” or “Reject” response. Not only does this enhance the customer experience by eliminating the need to remember complex static passwords or retyping one time passwords generated on a token, but the security of the online payments channel is significantly increased as well.

“Despite the clear vulnerabilities one time passwords present, many financial institutions continue to rely on this method of customer authentication before a transaction can be completed,” said John Bestbier, Group Executive: Strategy at Nedbank. “Rather than requiring our customers to enter static passwords or one time passwords that can easily be stolen or intercepted by online fraudsters, partnering with Entersekt enables us to leverage advanced authentication capabilities to streamline the approval process by utilizing the customer’s mobile to complete the purchase with a simple touch of a button. With no password to retype anymore, there is no password left for an online fraudster to steal.”

Designed to serve as an added layer of security for online card purchases, 3-D Secure has been proven to lower instances of card not present fraud, but has widely been dismissed by financial institutions due to the annoyances it presents consumers, such as difficulty with activation and inconsistent methods of authentication. Entersekt’s Online Card Purchase Authorization reinvents the 3-D Secure user experience by allowing consumers to authenticate purchases through their mobile device with the touch of a button.

“While there were definite short comings initially associated with 3-D Secure, we saw major potential for the standard to significantly impact transaction security once the consumer objections were fully addressed,” said Christiaan Brand, chief technology officer for Entersekt. “By abandoning reliance on passwords and instead leveraging the user’s mobile device for authentication, we are able to reduce abandonment rates for online purchases and streamline the authentication process to satisfy consumer demands and 3-D Secure standards simultaneously.”

About Nedbank

Nedbank Group is one of SA’s four largest banking groups by assets and deposits, with Nedbank Ltd our principal banking subsidiary. We are a JSE Top 40 company with our ordinary shares listed on the JSE since 1969 and on the Namibian Stock Exchange since 2007. Our market capitalisation was R107bn at 31 December 2013. Old Mutual plc is our majority shareholder, owning 52% of Nedbank Group. Headoffice in Sandown, Sandton, Johannesburg, SA.

About Entersekt

Entersekt is an innovative pioneer in transaction authentication. The company’s one-of-a-kind approach combines the power of electronic certificate technology (PKI) with the convenience of mobile phones and encrypted cloud messaging to provide financial institutions and their customers with full protection from online banking fraud. With its patented security products authenticating millions of transactions globally, none of Entersekt’s clients have experienced a successful phishing attack on their systems since implementing the company’s technology. Financial institutions worldwide look to Entersekt to strengthen the all-important bond of trust they share with their customers, and to build on those relationships by introducing increasingly innovative mobile and online banking services. For more information on Entersekt, visit www.entersekt.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and ...
How will your company move to the cloud while ensuring a solid security posture? Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is ...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device. For more information, please visit https://www.mangoapps.com/.
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...