{"id":616,"date":"2014-02-11T12:40:45","date_gmt":"2014-02-11T12:40:45","guid":{"rendered":"http:\/\/frslabs.com\/frsblog\/?p=616"},"modified":"2014-11-25T14:20:04","modified_gmt":"2014-11-25T14:20:04","slug":"application-fraud-tackle-it-head-on-using-atreus","status":"publish","type":"post","link":"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/","title":{"rendered":"Application Fraud \u2013 Tackle it head on using ATREUS."},"content":{"rendered":"<p>Application fraud manifests in different ways but the overarching principle that applies to Application fraud is those customers who come in with an intent to defraud the organization \u2013 i.e. applying for products or services for which they have no intent to pay. This is a serious problem and the fraud losses \u2013 mostly categorized as bad debt \u2013 can run into millions of dollars a year. A closer look can reveal customers who genuinely can\u2019t pay and those who won\u2019t pay but clubbed into one. As the \u201ccan\u2019t pay\u201d versus \u201cwon\u2019t pay\u201d distinction is getting ever harder to distinguish, customers who \u201cwon\u2019t pay\u201d tend to slip through the net far too easily, and far too often.<\/p>\n<p>Application Fraud or First Party Fraud as it\u2019s sometimes referred to in popular literature, is only predicted to increase with the advent of new controls that make it difficult for fraudsters to perpetrate traditional fraud. Chip and Pin credit cards are a case in point \u2013 what else would a fraudster think of when it\u2019s no more profitable to clone a card that has a chip and pin technology. The easiest option is to commit application or subscription fraud.<\/p>\n<p>Application fraud is pulled off in many ways \u2013 using own identity but with subtle changes in personal details to circumvent normal risk rating rules; creating fake, synthetic or multiple identities that pass off as genuine; stealing identities to obtain new products or services etc. While stringent checks are enforced these days by service providers to avert losses, fraudsters tend to remain a step ahead, constantly testing and getting through the thresholds set by the service providers.<\/p>\n<p>Tackling Application Fraud manually had some effect in loss prevention. However, this has lost steam as the sheer number of applications \u2013 often via new channels \u2013 has strained the manual process. Quite often even the legitimate customers are put through a long wait before services are approved. Speed of decision at the point of application is the new normal and afraid no manual process can match sophisticated technology to detect high risk customers instantly.<\/p>\n<p>This brings us nicely to how we can help tackle this menacing facet of fraud.<\/p>\n<p>Our <a title=\"Atreus FAQ\" href=\"http:\/\/frslabs.com\/frsblog\/2014\/09\/17\/atreus-application-fraud-faq\/\" target=\"_blank\">ATREUS<\/a> Application Fraud Management tool has a sophisticated search and decision engine that can provide instant accept, reject or refer decision. The tool also provides batch capabilities to vet all new connections to ensure no fraudsters accidentally slip through the net and it provides capabilities to filter out fraudulent customers from ever receiving new promotional offers. Atreus now comes with an API for easy integration with store systems and online systems.<\/p>\n<p>With a built in data integrator to source data from multiple silos and very low cost of ownership, you really should talk to us if Application Fraud is a major problem area preventing you from realising your full business potential.<\/p>\n<p>Talk to us for a demo of Atreus Application Fraud tool. Read <a title=\"Atreus FAQ\" href=\"http:\/\/frslabs.com\/frsblog\/2014\/09\/17\/atreus-application-fraud-faq\/\" target=\"_blank\">Atreus Application Fraud FAQ<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Application fraud manifests in different ways but the overarching principle that applies to Application fraud is those customers who come in with an intent to defraud the organization \u2013 i.e. applying for products or services for which they have no intent to pay. <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_s2mail":""},"categories":[1],"tags":[51,64,60,63,65,20,31],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Application Fraud<\/title>\n<meta name=\"description\" content=\"Application fraud manifests in different ways but fundamentally refers to those customers who come in with an intent to defraud the organisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/#website\",\"url\":\"https:\/\/www.frslabs.com\/frsblog\/\",\"name\":\"FRSLABS\",\"description\":\"Privacy Protection | Identity Verification | Fraud Managment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.frslabs.com\/frsblog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/#webpage\",\"url\":\"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/\",\"name\":\"Application Fraud\",\"isPartOf\":{\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/#website\"},\"datePublished\":\"2014-02-11T12:40:45+00:00\",\"dateModified\":\"2014-11-25T14:20:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/#\/schema\/person\/44aa0b93c2b856fcc15543185e8dbf3d\"},\"description\":\"Application fraud manifests in different ways but fundamentally refers to those customers who come in with an intent to defraud the organisation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.frslabs.com\/frsblog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Fraud \\u2013 Tackle it head on using ATREUS.\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/#\/schema\/person\/44aa0b93c2b856fcc15543185e8dbf3d\",\"name\":\"Shankar\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.frslabs.com\/frsblog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b71e9e7aa03a6cdafa4d0ae11becd9b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b71e9e7aa03a6cdafa4d0ae11becd9b?s=96&d=mm&r=g\",\"caption\":\"Shankar\"},\"sameAs\":[\"http:\/\/www.frslabs.com\"],\"url\":\"https:\/\/www.frslabs.com\/frsblog\/author\/shankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Fraud","description":"Application fraud manifests in different ways but fundamentally refers to those customers who come in with an intent to defraud the organisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/","twitter_misc":{"Written by":"Shankar","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.frslabs.com\/frsblog\/#website","url":"https:\/\/www.frslabs.com\/frsblog\/","name":"FRSLABS","description":"Privacy Protection | Identity Verification | Fraud Managment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.frslabs.com\/frsblog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/#webpage","url":"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/","name":"Application Fraud","isPartOf":{"@id":"https:\/\/www.frslabs.com\/frsblog\/#website"},"datePublished":"2014-02-11T12:40:45+00:00","dateModified":"2014-11-25T14:20:04+00:00","author":{"@id":"https:\/\/www.frslabs.com\/frsblog\/#\/schema\/person\/44aa0b93c2b856fcc15543185e8dbf3d"},"description":"Application fraud manifests in different ways but fundamentally refers to those customers who come in with an intent to defraud the organisation.","breadcrumb":{"@id":"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.frslabs.com\/frsblog\/2014\/02\/11\/application-fraud-tackle-it-head-on-using-atreus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.frslabs.com\/frsblog\/"},{"@type":"ListItem","position":2,"name":"Application Fraud \u2013 Tackle it head on using ATREUS."}]},{"@type":"Person","@id":"https:\/\/www.frslabs.com\/frsblog\/#\/schema\/person\/44aa0b93c2b856fcc15543185e8dbf3d","name":"Shankar","image":{"@type":"ImageObject","@id":"https:\/\/www.frslabs.com\/frsblog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/2b71e9e7aa03a6cdafa4d0ae11becd9b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b71e9e7aa03a6cdafa4d0ae11becd9b?s=96&d=mm&r=g","caption":"Shankar"},"sameAs":["http:\/\/www.frslabs.com"],"url":"https:\/\/www.frslabs.com\/frsblog\/author\/shankar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/posts\/616"}],"collection":[{"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":9,"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/posts\/616\/revisions"}],"predecessor-version":[{"id":732,"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/posts\/616\/revisions\/732"}],"wp:attachment":[{"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/media?parent=616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/categories?post=616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.frslabs.com\/frsblog\/wp-json\/wp\/v2\/tags?post=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}