Identify Mule Accounts with RSA Web Threat Detection

Turning credentials into cash would not be possible without the help of money mules. Whether in the form of humans or accounts, fraudsters have built sophisticated mule networks, making them one of the most difficult parts of the fraud supply chain to detect.  Learn how to write rules in RSA Web Threat Detection to uncover and investigate potential mule activity and how one organization is doing so with great success.

Title: Identify Mule Accounts with RSA Web Threat Detection
Type: On-Demand
Date: 25 Jan 2017
Duration: 30 min

John Watkins

John Watkins

Threat Analyst

451 Research Pathfinder Report: RSA Web Threat Detection

Analyst Report

451 Research Pathfinder Report: RSA Web Threat Detection

This analyst white paper showcases how web behavior analytics is being used to enhance fraud detection of multiple threats across customer-facing websites.

Download Now

RSA  Web Threat Detection

Data Sheet

RSA Web Threat Detection

Get Ahead of Automated Attacks & Digital Fraud Threats

Read Now