The information below serves as a supplement to the uComm Security page – offering more detail regarding what the uComm Global Transaction Gateway monitors and reports for each of the parties that can pose a threat to a transaction: merchants, processors, consumers, and cyber criminals.
With this comprehensive and granular view, risk managers are able to see the source of transaction failures.
Merchants
The reports and monitoring of/for merchants include:
- AVS/CVV reporting – Has the merchant disabled them to get a lift in sales? How many suspect transactions are being accepted? Are the AVS/CVV trend lines reflective of real changes in sales and marketing efforts and demographics or are there inexplicable changes?
- Excessive refunds and credits reporting
- Chargeback notifications and reporting
- Sales trend reports, specifically looking for things such as abnormal sales velocity, unsuspected spikes in sales, irregular shipping delays, impending fulfillment issues, and sharp drops in sales
- Daily risk monitoring, audit reports, and security violation tracking
- Merchant flags for custom rule violations – such as transaction amounts, volume, etc.
Processors
The reports, services, and monitoring of/for processors include:
- Isolation of problematic transactions by correlating alerts, transaction scoring, and POS entry method
- Ongoing analysis of the merchant’s security score and scoring flags
- Separate monitoring of 4 different types of merchants in the Merchant Risk Queue
- Standard – merchants who, after the first 90 days have one or fewer flagged transactions
- Limit – merchants who have triggered the Limit Flags and require close monitoring
- New Merchant – boarded in last 30 days and require close monitoring
- Tape Merchant – merchants who process through a 3rd party where data is settled on a separate backend
Consumers
The reporting, services, and monitoring associated with consumers includes:
- Negative consumer database with frequent updates
- Customer spending limits which enable customer service intervention on large and/or suspicious orders
- Customer scoring (every customer is assigned a score)
- Regulate spending by history (transactions, amount, frequency)
- Regulate spending by negative behavior (chargebacks, refunds, disputes)
- Account controls to limit attempts and amounts by day, week and month – option to reject, approve, or flag for review
- Merchant best practices reviews (AVS not matching, CVV not provided, multiple refunds, chargebacks)
Cyber Criminals
The reporting, services, and monitoring associated with protection from criminals includes:
- Protection from IP hopping and brute force attacks
- Review of transactions in real time
- Blocking of suspect transactions before settlement
- Negative databases from multiple merchant/retail sources as well as global fraud reporting agencies contributes to evergreen fraud management
- Regular negative database updates (IP addresses, phone numbers, names, card numbers)
- Sales velocity monitoring by card number, IP address, and phone number
- Custom rules and filters
- Ability to ability to reject, approve, or flag for review any suspect transactions based on custom rules or account controls / pre-defined filters