Presenter Script | Credit Card Fraud Detection
Second-screen guide
Presenter guide

Credit Card Fraud Detection

Use this on a second screen while you run the demo. This is designed to be more prescriptive: what this section is about, what to say, how to frame it, what to point at, and what to practice before you present.
Audience
Sales reps, sales engineers, payments risk teams, mixed technical and executive audiences
Core message
Authorization fraud cannot wait for batch scoring. Redis assembles the live card context — geo velocity, spending deviation, merchant risk, and typology signals — fast enough to make the right decision before the network confirms the charge.
Suggested runtime
12 to 15 minutes
Use this for
Practice, repetition, and live second-screen support while demoing.

How to use this script

Assume the rep or the SA has this script open on a second screen while running the demo. This is not background reading. This is the coaching layer. Use the "Say this exactly" line as the default talk track, then adapt with the framing notes if the room is more executive or more technical.

Opening message

Use this demo to tell a high-stakes payments story: the issuer already has the card, transaction, merchant risk, and device intelligence systems. What it often lacks is the low-latency context layer that can unify those signals fast enough to act inside the authorization window — before the charge settles and the chargeback clock starts.

Demo objective

Show how Redis RAM, Redis Flex, RDI, Redis Feature Form, and Redis Search help a card processor turn fragmented authorization checks into real-time decision infrastructure that blocks more fraud, reduces false positives, and protects the issuer from chargeback exposure.

What the audience should remember

Stage 1
Architecture

This section is about

This section sets up the operating model. Your job is to establish that the issuer already has the data and systems; the problem is operationalizing them fast enough to influence the authorization decision moment — inside the sub-100ms network window.

Say this exactly

This is one of the clearest examples of Redis being much more than cache. We are not talking about a recommendation tile or a session page load. We are talking about a fraud decision that has to happen before the card network gets the issuer response — in under 20 milliseconds.

At the top are the systems the issuer already runs: core banking, transaction history, merchant risk, device intelligence, and the real-time auth event stream. RDI and Redis Feature Form make those systems usable together in the runtime path. Redis RAM handles the hot authorization path, active dispute flags, and velocity counters. Redis Flex carries the broader transaction history, merchant patterns, and fraud embeddings. And the Redis Context Retriever sits below those stores, assembling the Transaction 360 — card state, spending history, and risk signals — and exposing it as structured tools for the decision engine.

What Redis is doing here is assembling operational card context fast enough for the authorization engine to make the right action decision now, before the charge settles.

Frame it this way

Frame this as an operating-model discussion, not a product inventory discussion. The audience should leave this slide understanding that Redis is the operational context layer between existing issuer systems and the authorization decisioning stack. Emphasize this point: This is mission-critical decision infrastructure, not marketing tech.

What to point at on screen

The Unified Context Layer is the key tier to reference. Redis RAM, Redis Flex, and Feature Store sit in the top row. Redis Context Retriever sits centered in a second row below them — this is where the Transaction 360 is assembled and exposed to the decision engine. Redis Search appears in the Decision Engine tier as the typology matching layer.

Practice note

Practice landing on this transition cleanly: "Now let me show you the exact authorization event where that architecture matters."

Message to reinforce

- This is mission-critical decision infrastructure, not marketing tech.
- Redis is assembling operational card context in the live authorization moment.
- The decision is an action decision: approve, decline, step up, or queue.

Transition to the next click

Now let me show you the exact authorization event where that architecture matters.

Stage 2
Auth Event

This section is about

This section introduces the specific fraud scenario. The power of this event is that it is immediately intuitive — impossible travel is something every audience member understands personally.

Say this exactly

Elena is a four-year cardholder with a consistent spending baseline in Chicago. Two hours ago she bought a coffee for $8.40 at a Chicago shop. Now the processor is seeing a $2,150 card-present transaction at an electronics store in Miami.

A flight from Chicago to Miami takes about three hours minimum. Elena cannot be in both cities. The card is either compromised or cloned.

The processor has under 100 milliseconds to make this decision. If it approves and the transaction settles, the issuer owns the chargeback. The question is whether the context needed to decline confidently can be assembled inside that window.

This is why Redis matters here. Cache might help a page load faster. It does not by itself help the issuer decide whether this transaction should approve, decline, or step up before the network confirms the charge.

Frame it this way

Frame this as a live authorization moment, not a fraud review queue item. The audience should feel the urgency of the window — once the charge settles, the loss path is already open. Emphasize this point: This decision has to happen before the network confirms the charge.

What to point at on screen

The last verified purchase row (Chicago, 2.1 hours ago) and the geo velocity row (impossible travel) — these two data points together tell the story before the audience needs to read anything else.

Practice note

Practice landing on this transition cleanly: "The next question is how the processor gets all of the necessary card context into one decision path fast enough to act."

Message to reinforce

- This is a live authorization moment, not a fraud review queue item.
- The decision has to happen before the network confirms the charge.

Transition to the next click

The next question is how the processor gets all of the necessary card context into one decision path fast enough to act.

Stage 3
Ingest

This section is about

This section is about how the existing issuer systems stay in place while Redis operationalizes their data. Emphasize additive architecture — not rip-and-replace, not a new fraud vendor.

Say this exactly

RDI synchronizes the cardholder, account, and transaction state. Redis Feature Form serves the online fraud features. Redis becomes the live working set that the authorization engine can query without waiting for a slow join across core banking, transaction history, and merchant risk systems.

That matters because authorization decisions are only as good as the operational picture they can assemble inside the network response window.

Frame it this way

Frame this as additive architecture. The issuer's existing systems remain the systems of record; Redis makes their data usable in the live authorization path. Emphasize this point: The systems stay where they are.

What to point at on screen

All five source systems feeding Redis through RDI and Redis Feature Form — especially the Kafka auth event stream, which carries the real-time authorization signal.

Practice note

Practice landing on this transition cleanly: "Once the data is flowing, the value is how complete the card picture becomes in the live authorization path."

Message to reinforce

- The systems stay where they are.
- Redis is the live working set for the authorization decision.

Transition to the next click

Once the data is flowing, the value is how complete the card picture becomes in the live authorization path.

Stage 4
Context

This section is about

This section is about the unified context layer. Slow down here and show how durable card history and live transaction signals come together to produce a decision-ready Transaction 360.

Say this exactly

The geo velocity signal alone is damning. But the picture gets stronger when you add the spending deviation — $2,150 at an electronics store for a cardholder whose typical transaction is under $400 — and the fact that this device has no prior 3DS history on record.

Redis Context Retriever assembles the Transaction 360 — card state, spending history, and risk signals — so the decision engine has exactly the live context it needs.

That is why we keep using the phrase unified context layer. A confident decline has to be grounded in the whole operational picture, not one disconnected signal from one disconnected system. A geo velocity flag on its own could be a data lag. Geo velocity plus spending deviation plus typology match is a different conversation entirely.

This is what Redis is assembling in real time, inside the authorization window.

Frame it this way

Frame this as the heart of the demo. If the audience remembers one thing, it should be that better authorization decisions come from better live card context, not from more static rules or slower batch scores. Emphasize this point: This is operational card context, not just a fraud score.

What to point at on screen

Durable card context on the left panel — especially the geo velocity violation row — and live auth context on the right panel, especially the spending deviation and device confidence rows. The context signal callout at the bottom ties both panels back to the Transaction 360.

Practice note

Practice landing on this transition cleanly: "With that context available, the authorization engine can now choose the right action."

Message to reinforce

- This is operational card context, not just a fraud score.
- The issuer needs converging evidence — geo, spend, device, and typology together.

Transition to the next click

With that context available, the authorization engine can now choose the right action.

Stage 5
Feature Serving

This section is about

This section is about why the model and rules engine can act in real time. The message is that online features arrive fast, consistently, and with train-serve parity — including the typology match from Redis Search.

Say this exactly

The hard problem is not calculating a risk score once a day. The hard problem is hydrating the right fraud features in milliseconds on the live authorization path.

That is where Redis Feature Form plus Redis RAM and Redis Flex matter. The authorization engine can pull geo velocity, spending deviation, merchant risk, device confidence, and typology match quickly enough to act inline, not after the charge settles. Notice that the typology match score comes from Redis Search — vector similarity against known card-present fraud patterns — running at 1.1 milliseconds. That is live pattern matching inside the authorization window.

Frame it this way

Frame this as the bridge between fraud models and production authorization outcomes. The point is not model training; the point is serving the right features inside the latency budget. Emphasize this point: Feature serving is what makes inline fraud decisioning practical at authorization time.

What to point at on screen

The geo_velocity_score (0.98) and typology_match_score (0.93) are the most compelling to highlight — both near the top of the confidence range and both served in under 1.2ms.

Practice note

Practice landing on this transition cleanly: "Now the authorization stack can choose the action, not just produce another score."

Message to reinforce

- Feature serving is what makes inline fraud decisioning practical at authorization time.
- Redis Search adds typology pattern matching inside the same latency budget.

Transition to the next click

Now the authorization stack can choose the action, not just produce another score.

Stage 6
Decision

This section is about

This section shows the authorization action ranking. Decline wins with high confidence. Keep the framing on why the context makes this a clear, defensible action — not just a threshold being crossed.

Say this exactly

Decline wins at 96% confidence because the context leaves no safe authorization path. Geo velocity violation plus spending deviation plus typology match — all three converge on the same answer.

3DS step-up is a reasonable secondary action, and it might be the right move if the geo signal alone were less extreme. But when typology match is at 0.93 and device history is near zero, a step-up challenge is insufficient protection for this specific event.

Auto-approve is correctly suppressed. If the processor approves this transaction and it settles, the issuer owns the chargeback. The context makes that outcome indefensible.

This is where Redis earns its role as decision infrastructure. It is helping the issuer choose the right action from unified card context, not just passing along a generic fraud score that hits a threshold.

Frame it this way

Frame this as an action decision, not a score decision. The audience should feel the difference between "the fraud score exceeded a threshold" and "the converging evidence from live card context points to one defensible action." Emphasize this point: This is a context-grounded action decision, not just a score.

What to point at on screen

The winning Decline card and the suppressed Auto-approve card together tell the story — high confidence on one end, near-zero on the other, with the converging evidence driving the gap.

Practice note

Practice landing on this transition cleanly: "Now let's translate that into the operational and financial value for the issuer."

Message to reinforce

- This is a context-grounded action decision, not just a score.
- The right answer is clear when the live evidence converges.

Transition to the next click

Now let's translate that into the operational and financial value for the issuer.

Stage 7
Business Impact

This section is about

This section translates the technical story into business value. Tie the decision quality back to fraud loss prevention, chargeback protection, and false-positive control for legitimate cardholders.

Say this exactly

Inline authorization context means stopping more fraud before the charge settles — which is where the issuer's financial exposure actually begins. It also means the decline is grounded in enough evidence to avoid the false-positive problem: a legitimate cardholder who triggers a geo flag but doesn't match the typology pattern passes through, rather than getting blocked by a blunt rule.

That helps on both sides of the fraud equation: lower loss exposure from actual fraud, and lower relationship damage from over-blocking legitimate spend.

Frame it this way

Frame this in business terms only. The rep should own this slide and make the value feel measurable — chargeback rates, fraud loss ratios, false-positive decline rates. Emphasize this point: The value is better authorization quality, not just faster response time.

What to point at on screen

Fraud loss prevention and false-positive control rows — these are the two metrics payments risk teams care about most. The "blocked before chargeback" outcome panel on the right shows the difference from late detection to inline action.

Practice note

Practice landing on this transition cleanly: "Let me show what that difference looks like in the actual authorization experience."

Message to reinforce

- The value is better authorization quality, not just faster response time.
- Redis improves both fraud protection and approval rate precision.

Transition to the next click

Let me show what that difference looks like in the actual authorization experience.

Stage 8
Outcome

This section is about

This section is the visible before-and-after. Keep it simple and let the audience see the difference between fragmented authorization and Redis-powered inline decisioning.

Say this exactly

On the left, the processor is making an authorization decision from siloed systems with delayed signal joins. The fraud gets through, the charge settles, and the issuer owns the chargeback.

On the right, the Transaction 360 is assembled in Redis before the network gets the response. The decision is a confident decline with 96% confidence, grounded in geo velocity, spending deviation, and typology pattern — all available inline.

That is why this is such a strong Redis story. It is clearly beyond cache and clearly central to a mission-critical payments workflow.

Frame it this way

Frame this as the payoff slide. Same card network, same cardholder, same transaction — different context layer, different authorization quality. Emphasize this point: Same card network. Different authorization quality.

What to point at on screen

Fragmented authorization on the left with "late detection / missed fraud / exposed chargeback" metrics. Redis-powered authorization on the right with "96% confidence / <20ms / blocked fraud" metrics.

Practice note

Practice landing on this transition cleanly: "This is the visible result of the architecture we started with."

Message to reinforce

- Same card network. Different authorization quality.
- What changes is not the existence of fraud systems. What changes is how complete the runtime card context is.

Transition to the next click

This is the visible result of the architecture we started with.

Stage 9
Architecture Recap

This section is about

This section closes the loop. Re-state the architectural lesson and remind the audience that the confident decline is only possible because the Transaction 360 was assembled inside the authorization window.

Say this exactly

The issuer keeps its core banking, transaction history, merchant risk, device intelligence, and card network systems. Redis sits between those systems and the authorization action, assembling the live card context needed to approve, decline, step up, or queue — inside 20 milliseconds.

That is the strategic change in mindset: Redis is no longer just a cache near the payments workflow. Redis is part of the payments workflow's decision substrate.

Frame it this way

Frame this as the close. Re-state the architectural lesson and the next logical step to pilot the approach on a high-volume card present or CNP path. Emphasize this point: Redis is the operational card context layer.

What to point at on screen

Architecture recap with latency, primary goal, and Redis-role callouts at the bottom. The five-tier flow from data sources to output actions tells the complete story in one view.

Practice note

Practice landing on this transition cleanly: "The next step would be piloting this on one high-volume authorization path, one fraud typology, and one measurable chargeback or false-positive KPI."

Message to reinforce

- Redis is the operational card context layer.
- This is the move from post-settlement detection to inline authorization decisioning.

Transition to the next click

The next step would be piloting this on one high-volume authorization path, one fraud typology, and one measurable chargeback or false-positive KPI.

Objections handling

Pacing guidance