Welcome!

News Feed Item

Nedbank Implements Entersekt’s Online Card Purchase Authorization Technology to Enhance Internet Fraud Protection

With EMV’s continued expansion overseas and impending adoption in the U.S., fraudsters are turning away from scamming physical credit and debit cards and instead setting their sights on the card-not-present space online. In an effort to further protect its customers from potential fraud online, South African-based Nedbank has partnered with Entersekt, an innovative pioneer in transaction authentication, to integrate the solution provider’s Online Card Purchase Authorization technology into the bank’s Approve-it system. Approve-it is an implementation of Entersekt’s interactive transaction authentication technology, and since the launch of Approve-it on Nedbank’s online banking channel, Nedbank has published a 99% drop in phishing attacks on this channel.

Given the success of Approve-it on the online banking channel, Nedbank is leveraging Entersekt’s unique Online Card Purchase Authorization technology to expand the protective reach of Approve-it to the card not present channel. Approve-it now also serves as an enhanced security feature to allow Nedbank’s customers to authenticate online card purchases directly through their personal mobile device. When a Nedbank customer performs a 3-D Secure online purchase with their card, they will receive a push message via their mobile device requesting them to authorize the transaction with a simple “Accept” or “Reject” response. Not only does this enhance the customer experience by eliminating the need to remember complex static passwords or retyping one time passwords generated on a token, but the security of the online payments channel is significantly increased as well.

“Despite the clear vulnerabilities one time passwords present, many financial institutions continue to rely on this method of customer authentication before a transaction can be completed,” said John Bestbier, Group Executive: Strategy at Nedbank. “Rather than requiring our customers to enter static passwords or one time passwords that can easily be stolen or intercepted by online fraudsters, partnering with Entersekt enables us to leverage advanced authentication capabilities to streamline the approval process by utilizing the customer’s mobile to complete the purchase with a simple touch of a button. With no password to retype anymore, there is no password left for an online fraudster to steal.”

Designed to serve as an added layer of security for online card purchases, 3-D Secure has been proven to lower instances of card not present fraud, but has widely been dismissed by financial institutions due to the annoyances it presents consumers, such as difficulty with activation and inconsistent methods of authentication. Entersekt’s Online Card Purchase Authorization reinvents the 3-D Secure user experience by allowing consumers to authenticate purchases through their mobile device with the touch of a button.

“While there were definite short comings initially associated with 3-D Secure, we saw major potential for the standard to significantly impact transaction security once the consumer objections were fully addressed,” said Christiaan Brand, chief technology officer for Entersekt. “By abandoning reliance on passwords and instead leveraging the user’s mobile device for authentication, we are able to reduce abandonment rates for online purchases and streamline the authentication process to satisfy consumer demands and 3-D Secure standards simultaneously.”

About Nedbank

Nedbank Group is one of SA’s four largest banking groups by assets and deposits, with Nedbank Ltd our principal banking subsidiary. We are a JSE Top 40 company with our ordinary shares listed on the JSE since 1969 and on the Namibian Stock Exchange since 2007. Our market capitalisation was R107bn at 31 December 2013. Old Mutual plc is our majority shareholder, owning 52% of Nedbank Group. Headoffice in Sandown, Sandton, Johannesburg, SA.

About Entersekt

Entersekt is an innovative pioneer in transaction authentication. The company’s one-of-a-kind approach combines the power of electronic certificate technology (PKI) with the convenience of mobile phones and encrypted cloud messaging to provide financial institutions and their customers with full protection from online banking fraud. With its patented security products authenticating millions of transactions globally, none of Entersekt’s clients have experienced a successful phishing attack on their systems since implementing the company’s technology. Financial institutions worldwide look to Entersekt to strengthen the all-important bond of trust they share with their customers, and to build on those relationships by introducing increasingly innovative mobile and online banking services. For more information on Entersekt, visit www.entersekt.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Stratoscale, the software company developing the next generation data center operating system, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified – now it's a component-based well-performing framework. This immersive one-day workshop at 18th Cloud Expo, led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and the product company SuranceBay, will provide you with everything you wanted to know about Angular 2.
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...