Big Data: Breaking Down Silos

ThreatMetrix's Baumhof on Big Data Making Fraud, Security Collaborations
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.

Baumhof, chief technology officer at the security solutions vendor, says there has been a shift in organizations, and it's resulting in bringing together different team members.

"Security and fraud, traditionally two different departments within the enterprise, now have a platform to provide a collaboration," he says.

Typically, there are boundaries or silos separating security and fraud organizations, but big data solutions can leverage information from one pool and provide benefits for all areas, Baumhof says.

A context-based authentication solution can help in the process. By using more than just credentials, a solution can inform organizations of who is a good customer and who is a potential fraudster.

In an interview recorded at the Gartner Security & Risk Management Summit, Baumhof discusses:

  • How big data works with traditional security solutions;
  • The emerging business value of big data;
  • Big data trends to watch.

Baumhof is an expert in encryption, PKI, malware and phishing. Before joining ThreatMetrix, Baumhof was an executive director, CEO and co-founder of Australian-based TrustDefender, a provider of security and fraud detection technologies. Baumhof previously served as co-founder and chief technology officer of Microdasys Inc., a provider of deep content security solutions. While there, he developed the first SSL proxy and has patents pending in Europe and the U.S.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.