Resources
See latest resources »
BT takes the direct approach

BT takes the direct approach

Source: Eiger Systems, BT

When UK telco BT decided to upgrade its Web site to enable customers to set up direct debit payments online, it had to overcome potentially troubling issues related to volume management, validation data updates and platform compatibility.

Although a paperless direct debit system provides significant benefits, it can also be a potential source of expensive errors unless handled in the correct way. Allowing customers to either contact BT’s customer service advisors who enter the bank details online via a computer system or by entering their own bank details into a website without proper validation is likely to result in an unacceptable volume of errors.

After consultation with its lead bank and UK payments body Bacs, BT selected validation software from Eiger Systems to sit alongside legacy billing systems on a large IBM MVS mainframe that handles all the utility's billing and payment processing.

The Eiger validation solution comprises both the software for processing checks on inputted bank data and an accurate, updated database of the source data itself.

Download the document now 966.1 kb (Adobe Acrobat Document)

Comments: (0)

Case Study resources
See all Case Study resources »
Westpac Banking Corporation Case Study
/case study

Westpac Banking Corporation Case Study

Westpac Banking Corporation, one of the world’s leading commercial banks, was looking to differentiate itself in a prosperous and already digital-heavy economy.

Odeabank's mobile security challenge
/case study

Odeabank's mobile security challenge

Turkey's Odeabank achieved all-round security for its mobile banking apps by using Vasco's Digipass for Apps software development kit.

An SDK for combatting fraud at mobile banks
/case study

An SDK for combatting fraud at mobile banks

Jibun Bank, a Japanese mobile-oriented internet bank, turned to Vasco in an effort to enhance its countermeasures against online frauds such as man-in-the-browser attacks by strengthening its authentication process.