IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Management Multimedia (View All Report Types)
 
Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Post-Password Security: AI, Risk-Based and Context
sponsored by Crossmatch
WEBCAST: Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 24 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

Endpoint 101: How Do Different Types of Antivirus Work?
sponsored by Carbon Black
WEBCAST: Take a look at this quick 101 endpoint security webcast to learn more about antivirus approaches and their strategies to enhance your endpoint security.
Posted: 24 Aug 2017 | Premiered: Aug 18, 2017

Carbon Black

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

3 Tips for Virtual Environments and the Modern Data Center
sponsored by Commvault
VIDEO: Your hybrid IT strategy needs to include a plan for modernizing the data center assets you own and operate, including the virtual environments that you rely on every day. Discover how to avoid adding a new management tool for every new piece of infrastructure or cloud that is adopted into the hybrid IT estate.
Posted: 11 Aug 2017 | Premiered: 31 Jul 2017

Commvault

Cisco Umbrella: How does it Improve Security Effectiveness?
sponsored by Cisco Umbrella
VIDEO: Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.
Posted: 28 Jul 2017 | Premiered: 03 Feb 2017

Cisco Umbrella
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement