Index
A B C D E F G H I K M N O P Q R S T
A
- Adaptive Risk Manager, 1.2.2, 3
-
- engine, 3.2.1
- Adaptive Risk Manager Offline, 1.2.2.2
- Adaptive Risk Manager Online, 1.2.2.1
- Adaptive Strong Authenticator, 1.2.1, 2
- administration tools, 3.2.5
- Agent Cases, 7
- agent cases, 7.2.1
- Auto-learning, Preface
- autolearning, 5
B
- BI Publisher reports
-
- patterns reports, 5.4
- buckets, 5, 5.1
C
- Configurable Actions, Preface
- CSR case
-
- new, creating, 7.1.1
- CSR Cases, 7
- customer data, 3.2.1.1
- Customizable reporting using BI Publisher, Preface
D
- dashboard, 3.2.5.1
- deployment options, 2.3
- Device Registration, Preface
- device registration, 8
E
- Enumeration Editor, Preface
F
- forensics, 3.2.1.2
- fraudster rules, 3.2.1.1
- fraudulent transaction, 2.1
G
- Globalization Support, Preface
- groups, 4.2.7
H
- historical data (data warehouse), 3.2.1.1
I
- internal flag/watch list, 3.2.1.3
- Investigation tools, Preface
- investigation tools, 3.2.5.6
- IP intelligence, 3.2.1.1
K
- KeyPad, 2.2.2
M
- models, 3.2.4, 4
- models/rules, customer, 3.2.1.2
- multiple factor risk protection, 3.1
N
- nested model, 3.2.1.2
- new features, Preface
O
- online fraud, impact, 1
- Oracle Adaptive Access Manager (OAAM), 1
P
- password theft, 2.1
- pattern evaluation, 5.2
- patterns, 5
- phishing (social engineering), 2.1
- phishing environment, 2.1
- PinPad, 2.2.2
- policies
-
- security, 3.2.1.1
- transaction, 3.2.1.1
- policy type, 4.2.15
- proprietary fingerprinting, 3.2, 3.2.3
Q
- QuestionPad, 2.2.1
R
- real-time response, 3.2.1.3
- reports, 3.2.5.2
- risk data, 3.2.1.1
- risk scoring, 3.2.1.2, 4.2.12
- Rule Template Editor, Preface
- rules, 3.2.4, 4.1
- rules engine, 3.2.1.1
- runtime, 4.2.17
S
- secondary authentication
-
- online, 3.2.1.3
- security policies, 3.2.1.1
T
- TextPad, 2.2.3
- third-party data, 3.2.1.1
- Transaction Definitions, Preface
- transaction definitions, 6
- transaction policies, 3.2.1.1
- trojan viruses, 2.1