Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Detection and Monitoring Hub, a product by PwC, enhances your previous investments by swiftly uncovering compliance insights like fraud and corruption while adapting based on monitoring outcomes. By focusing on high-risk activities in dynamic markets, it enables you to better allocate resources using advanced analytics and machine learning techniques. With established frameworks, rules, and processes, your teams can ensure consistent recommendations across all risk and compliance initiatives. This solution streamlines operations into one cohesive system, improves alert management, and minimizes false positives, effectively lowering the costs associated with risk management and compliance. Utilizing cutting-edge algorithms and artificial intelligence, combined with our unparalleled industry expertise, we enhance the speed and precision of risk detection. The Detection and Monitoring Hub integrates data, systems, and processes to create a singular, reliable source of information. Designed for quick deployment, it ensures you can rapidly transition from planning to action without delay. This efficiency not only saves time but also allows your organization to respond proactively to emerging risks.
Description
All types of frauds can be addressed with one solution. Subex Fraud Management is a 25-year-old domain expertise that provides 360 degree fraud protection across digital service by leveraging advanced machine intelligence and signaling intelligence. This solution combines a traditional rule engine with advanced AI/machine learning capabilities to increase coverage across all services and minimize fraud run time in the network. It also includes real-time blocking capabilities. The Subex Fraud Management solution's core is a hybrid rule engine. It covers detection techniques such as expressions, thresholds, and trends. Rule engine comprises of a combination of threshold rules, geographic rules, pattern (sequential) rules, combinatorial rules, ratio/proportion-based rules, negative rules, hotlist based rules, etc. These rules allow you to monitor advanced threats in your network.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
PwC
Founded
1998
Country
United Kingdom
Website
www.pwc.com/us/en/products/detection-and-monitoring-hub.html
Vendor Details
Company Name
Subex
Founded
1992
Country
India
Website
www.subex.com/fraud-management/
Product Features
Fraud Detection
Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Product Features
Fraud Detection
Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval
Telecom Expense Management
Billing for Data
Billing for Voice
Call Monitoring
Chargeback Tracking
Contract Negotiation
Fixed Line Compatibility
Internal Cost Allocation
Mobile Line Compatibility
Usage Reporting