IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Multimedia (View All Report Types)
 
Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

Case Study: A New Approach to Network Monioring and Security
sponsored by Gigamon
VIDEO: This case study introduces a new approach used by the University of Glasgow to improve network visibility and security wihout adding on appliances. View now to learn how to detect and remedy infected endpoints before disaster occurs and if this strategy if right for your organization.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015

Gigamon

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

On Demand Cloud Platform™ Caters to Developers
sponsored by Peer1
VIDEO: View this video to find out how developers can have control over their own environments with a specific type of cloud platform.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement