Skip to main content

Help us improve the Digital Marketplace - send your feedback

Experian

Experian Application and Customer Fraud Screening with Hunter

Hunter screens applications and customers to highlight potentially fraudulent activity. It checks against previous applications or accounts for potential data manipulation and anomalies that could indicate fraud, previous applications that are known or suspected to be fraudulent, indicators of fraud risk and PEPs,Sanctions, and Adverse Media data.

Features

  • Available via Experian’s CrossCore Platform / Application Programming Interface (API).
  • Available as real time integrated, user interface or batch.
  • Configure different rules for different services and types of fraud.
  • Rapidly amend rules as fraud profiles and services change.
  • Wide range of configurable, interactive tools to assist investigation.
  • Graphical visualisation of links between matched items.
  • Ranked user or role specific worklist of outstanding cases.
  • Record outcomes for immediate use in detection, monitoring and analysis.
  • Integrated management information and dashboard for constant monitoring
  • Search ‘CrossCore’ in G-Cloud to view other backing applications available.

Benefits

  • Holistic view of risk associated to an application or customer.
  • Immediately begin identifying suspect activity with proven fraud detection rules.
  • Control the quality, accuracy and efficiency of the detection process.
  • Clear visualisation of how information is linked together.
  • Analyse fraud trends and patterns including organised fraud rings.
  • Evaluate the system performance and your fraud prevention team’s efficiency.
  • Quantify the value of fraud prevented.
  • Minimise PEPs,Sanctions and Adverse Media false positives through highly-configurable-rules.
  • Risk-averse approach to data management
  • Our B2B and B2C solutions help government derisk digital services.

Pricing

£10,000 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at digitalmarketplace@experian.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 1 2 7 8 4 8 5 6 6 5 7 7 0 0

Contact

Experian Experian Public Sector
Telephone: +44 (0) 115 941 0888
Email: digitalmarketplace@experian.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No, however if we do have any planned improvements which we believe will materially affect your service, we will contact you.
System requirements
  • Supported web browser
  • Additional licenses may be required for integrated data validation tools

User support

Email or online ticketing support
Email or online ticketing
Support response times
To manage client services effectively and consistently, Experian provides Major Incident Management, Incident Management, Service Request Management, Problem Management and Operational Change Management with standardised processes. Incidents and Major Incidents are given Priorities, with higher Priorities receiving faster responses and restoration times. Tracking these values and performing internal data analysis enables Experian to continually improve these services and reduce impact to all clients.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Constant review/enhancement of user journey to ensure case resolution provided via chat
Onsite support
Yes, at extra cost
Support levels
Non-standard support levels by arrangement with individual customers.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Full user guides available, welcome product calls, online FAQ and troubleshooting, plus paid-for integration assistance and training available
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Available upon request otherwise all data will be permanently deleted.
End-of-contract process
At the end of the contract, the Buyer shall cease to use all Licensed Materials and Licensed Programs

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
The interface is a JSON web service interface that users can integrate against as many of the available services as required.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The solution allows for multiple different configurations depending upon use case and needs.

Scaling

Independence of resources
Hunter is a multi-tenanted solution.

In capacity planning, consideration is given to increased demand over time and fluctuating peaks and troughs in demand, identified through understanding concurrent users, types of users, types of activity undertaken, seasonal activity, etc.

In addition, the system is continually monitored for activity and performance to ensure that the service received is of the highest possible quality.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users export their data to a designated location in a prescribed format.
Data export formats
  • CSV
  • Other
Other data export formats
  • .txt
  • .xls or .xlsx
  • .xml
  • .dat
  • .json
Data import formats
  • CSV
  • Other
Other data import formats
  • .txt
  • .xls or .xlsx
  • .sas7dbat
  • .psv
  • .dat

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Availability SLAs will be defined on a per-deployment basis
Approach to resilience
Available on request
Outage reporting
Available on request

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
-
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DNV GL Business Assurance Limited
ISO/IEC 27001 accreditation date
20/12/2016
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Trustwave
PCI DSS accreditation date
28/10/2016
What the PCI DSS doesn’t cover
N/A
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Experian have a comprehensive global security policy based on the ISO27001 standard which covers: Organisation and Management, information security, asset classification, physical and environmental security, communications and operations management, system access, systems development and maintenance, compliance, personnel and provisioning, business continuity management, third party management.

The policy is owned by Experian's executive risk management committee which is an executive level body, and which assumes ultimate responsibility for Experian's risk position.

Information security is a key component of the risk management framework. Experian management supports security through leadership statements, actions and endorsement of the security policy and implementing/improving the controls specified in the policy.

The policy is available to all Experian employees and contractors on the intranet. Changes to the policy are announced on the company's intranet computer based information security and data protection training, and this is repeated on at least an annual basis. Compliance to policy is overseen by internal audit.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Approach Experian have a change management policy which is underpinned by processes and procedures based on ITIL best practice. This is a mature process. We use a service management tool that integrates change management, incident management, problem management, configuration management and knowledge management. Our change management policy, processes, and procedures are regularly audited by independent auditors. Formal risk analysis is employed using an approved information risk analysis phase for developments/changes. Security requirements for the system are identified and continue to be considered throughout the life of the product.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Servers and PCs are built to a documented secure standard, which includes anti-virus and malware defences. Information assets have a defined patching schedule, determined by the system's criticality and the level of threat the patch is mitigating. Experian actively monitors threat environment and checks the effectiveness of security controls by reviewing both free and paid for sources of threat information, including, public information, major vendor feeds and also receiving information from specialist closed group mailing lists. The overall process is also plugged into an automated patch and fix strategy, underpinned with a technology infrastructure to deliver corrective updates.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Monitoring processes and tools are in place to manage alarms generated by security related alerts and these are fed into the incident management process. Experian has a formally documented risk based incident management process to respond to security violations, unusual or suspicious events and incidents. In the event an incident occurs a team of experts from all relevant areas of Experian are gathered to form an incident response team, who manage activities until resolution. The incident response team are available 24/7 to resolve any incident. Out of core hours the dedicated incident hotline is routed to the command centre
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
The incident management process incorporates a number of participants and contributors, including: Global Security Office - who facilitate and coordinate activities under the business security coordinator's guidance; Business Security Coordinator - a representative of the impacted business area, responsible for coordinating resolution activities; Incident Response Team (IRT) - IRT is made up of a membership that are empowered to make key decisions surrounding the actions to be taken to reduce impact, control actions, and impose corrective activities. A client report would be created, including: high level overview; facts; overview of events; actions taken.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As an information services business, we have a relatively small environmental footprint compared to
many other industries. The biggest impact from our controlled operations relates to greenhouse gas
emissions from energy used to power, heat and cool our buildings and data centres, and from
business travel (pre-Covid-19). Every year we reduce our carbon footprint, yet we want to take it
further and accelerate our response to the climate change challenge
We’ve started our journey to becoming carbon neutral. Our global Corporate Responsibility team is
engaging with various teams across the organisation to discuss carbon reduction initiatives and get a
good understanding of what’s needed to achieve our target by 2030. This will allow us to develop a
detailed Carbon Neutral Plan, including initiatives, targets, costings and timeframes, for agreement by
end of November.

Covid-19 recovery

We have focused on supporting our people, clients and consumers throughout the COVID-19
pandemic, using data as a force for good, helping to navigate the crisis.
We quickly transitioned the majority of our employees to work from home. We introduced flexible
working and increased collaboration tools and support networks, such as mindfulness programmes, to
help our people navigate the challenges of home working. Webinars and senior leadership vlogs
helped us connect. Our employees around the world have shown incredible resilience, commitment
and flexibility during the COVID-19 pandemic and this is reflected in our results.
We maintained operational capacity throughout the pandemic, we have kept the health and safety of
our employees as the primary consideration of our pandemic response. Most of our employees are
still working remotely. An effort is underway to determine our strategy for work arrangements in the
future. We expect this to be guided by a consistent global framework and principles, with local
flexibility around the approach to account for legal and cultural nuances.
We continue to take industry-leading positions designed to protect and educate consumers, as well as
to promote the responsible reporting of data, with appropriate safeguards, in order to help the
economic recovery from the crisis.

Tackling economic inequality

We help millions of people and businesses around the world get fair and affordable access to
essential services and we work hard to make sure our business has a positive impact on the world,
never a negative one. Our responsibilities – to people, society and the environment – guide
everything we do.
By collecting and analysing data, we help people and businesses build up a financial track record and
gain access to essential, everyday services that have previously been out of reach. We’re also
pioneering the use of alternative data, such as rental or utility payments, to help people with limited
financial history build up and strengthen their credit profiles.
Our people’s talents and our business resources go beyond the workplace. We encourage our people
to use their skills to benefit society: many volunteer their time and skills to support their communities
and improve financial education.
We also help our people support local groups and charities by matching funding and giving donations.
At Experian we realise relationships with all our stakeholders are key to our success and sustainable
business growth. We also recognise that we have an impact on and responsibilities for the society we
trade within. We consider these responsibilities carefully and aim to have a positive impact wherever
we can.
Experian has developed a set of CR principles, endorsed by our Management Committee, to guide
and enhance the way we work with our customers (both clients and individual consumers),
colleagues, suppliers and communities. As a company, we are committed to working by these
principles and will regularly benchmark and assess our progress in each area and report through our
parent company.
Please see a copy of Experian’s supply chain principles on the following link:
https://www.experian.com/corporate/code-of-business-conduct

Equal opportunity

Each and every one of our people deserves to feel valued, represented, and that they belong at
Experian. We have over 30 employee-led groups globally that play a huge part in creating inclusion
and advocating on behalf of our people. These groups are not only a safe space for anyone who
needs it, but also drive change and build awareness across Experian, raising the standard for
everyone.
Experian are registered as ‘Disability Confident’ and are currently undertaking an assessment with the
Business Disability Forum. Our top 3 areas for focus this year is in learning & development,
communications and technology. Our ambition is to remove barriers for all employees with disabilities
at Experian.
Experian recognises that equal opportunities are fundamental to the Company’s success and is
committed to encouraging a working climate that respects and promotes equality. There is a
publicised Equality, Diversity and Inclusion policy which sets out the Company and employee
responsibilities for ensuring equality and embedding a culture and working environment that actively
safeguards against discrimination and unfavourable treatment of people in all aspects of employment
including recruitment, promotion and training opportunities. There is also a Dignity at Work policy
which sets out Experian’s commitment to creating a work environment free of harassment and
bullying, ensuring everyone is treated with dignity and respect. All of the policies are compliant with
the requirements of the Equality Act 2010 and the relevant clauses of the HRA.
More information can be found in Experian’s Diversity, Equity and Inclusion Report here:
https://www.experianplc.com/investors/reports/

Wellbeing

Since the pandemic we have increased our focus on the health and well-being of our teams across
the world. We quickly implemented regular pulse surveys so we could respond rapidly and ensure the
right support was available. We emphasised mental health, reflecting the challenges people faced
while working remotely. A response to the statement ‘I am feeling physically and mentally well’ was
75% favourable on average across five pulse surveys we ran during the year. We put in place a range
of initiatives to support our teams, for example #ReachOut, which gave all employees access to
resources to support their physical and mental health whenever they needed it.
Experian has an important role to play in helping everyone through these uncertain times. We
recognise the significance of the role we play in the UK economy and we are committed to ensuring
that our data services are being used to help, protecting vulnerable people, businesses and
communities.
At Experian, we work to create a better tomorrow for consumers, for businesses, and for our
communities. This ambition underpins our plans for our people – to ensure we have the best people,
working in a high-performing and inclusive environment where they feel they can do their best work in
support of our vision.
We help millions of people gain access to essential, everyday services by helping them make the
most of their data by Improving financial identities and access to credit, providing credit and financial
education and tackling unmanageable debt among vulnerable groups. We define our responsibility as
playing an active part in social and economic regeneration in our communities, at a local, national and
global level, and we have many motivations for this engagement.

Pricing

Price
£10,000 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Free proofs of concept available upon request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at digitalmarketplace@experian.com. Tell them what format you need. It will help if you say what assistive technology you use.