IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Management Multimedia (View All Report Types)
 
Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

A10 Networks Thunder ADC Provides Protection from Encrypted Threats
sponsored by A10 Networks
VIDEO: Access this short video to see a visualization of the threat posed by encrypted data traffic, and what a solution looks like.
Posted: 02 Jun 2015 | Premiered: 02 Jun 2015

A10 Networks

The 5 Levels of IT Service Optimization Maturity
sponsored by TeamQuest Corporation
WEBCAST: This webcast explores the 5 levels of IT service optimization maturity and how that affects business outcomes.
Posted: 16 Jun 2015 | Premiered: Jun 16, 2015

TeamQuest Corporation

The Benefits of Cloud Mobility Management
sponsored by BlackBerry
WEBCAST: In this webcast, discover how cloud EMM works and what benefits it provides.
Posted: 24 Apr 2015 | Premiered: Apr 9, 2015

BlackBerry

On Demand Cloud Platform™ Caters to Developers
sponsored by Peer1
VIDEO: View this video to find out how developers can have control over their own environments with a specific type of cloud platform.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Avoid the Blame Game with ExtraHop Wire Data Analytics
sponsored by Citrix Ready and ExtraHop
WEBCAST: In this webinar, Citrix CTP John Smith will run a demo to show how ExtraHop extends the power of HDX Insight to provide visibility into all applications delivered over Citrix.
Posted: 12 Jun 2015 | Premiered: Jun 25, 2015

Citrix Ready and ExtraHop
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement