Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Safeguard business service-level agreements by utilizing dashboards that enable monitoring of service health, troubleshooting alerts, and conducting root cause analyses. Enhance mean time to resolution (MTTR) through real-time event correlation, automated incident prioritization, and seamless integrations with IT service management (ITSM) and orchestration tools. Leverage advanced analytics, including anomaly detection, adaptive thresholding, and predictive health scoring, to keep an eye on key performance indicators (KPIs) and proactively avert potential issues up to 30 minutes ahead of time. Track performance in alignment with business operations through ready-made dashboards that not only display service health but also visually link services to their underlying infrastructure. Employ side-by-side comparisons of various services while correlating metrics over time to uncover root causes effectively. Utilize machine learning algorithms alongside historical service health scores to forecast future incidents accurately. Implement adaptive thresholding and anomaly detection techniques that automatically refine rules based on previously observed behaviors, ensuring that your alerts remain relevant and timely. This continuous monitoring and adjustment of thresholds can significantly enhance operational efficiency.
Description
All types of frauds can be addressed with one solution. Subex Fraud Management is a 25-year-old domain expertise that provides 360 degree fraud protection across digital service by leveraging advanced machine intelligence and signaling intelligence. This solution combines a traditional rule engine with advanced AI/machine learning capabilities to increase coverage across all services and minimize fraud run time in the network. It also includes real-time blocking capabilities. The Subex Fraud Management solution's core is a hybrid rule engine. It covers detection techniques such as expressions, thresholds, and trends. Rule engine comprises of a combination of threshold rules, geographic rules, pattern (sequential) rules, combinatorial rules, ratio/proportion-based rules, negative rules, hotlist based rules, etc. These rules allow you to monitor advanced threats in your network.
API Access
Has API
API Access
Has API
Integrations
BlueCat Gateway
CloudFabrix
Cyberint Argos Platform
Evolven
SAP Store
Splunk User Behavior Analytics
The Galileo Suite
Integrations
BlueCat Gateway
CloudFabrix
Cyberint Argos Platform
Evolven
SAP Store
Splunk User Behavior Analytics
The Galileo Suite
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cisco
Founded
1984
Country
United States
Website
www.splunk.com/en_us/products/it-service-intelligence.html
Vendor Details
Company Name
Subex
Founded
1992
Country
India
Website
www.subex.com/fraud-management/
Product Features
IT Alerting
Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
Product Features
Fraud Detection
Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval
Telecom Expense Management
Billing for Data
Billing for Voice
Call Monitoring
Chargeback Tracking
Contract Negotiation
Fixed Line Compatibility
Internal Cost Allocation
Mobile Line Compatibility
Usage Reporting