IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Multimedia (View All Report Types)
 
Cloud Computing and Banking: Combatting ATM Fraud
sponsored by Splunk
VIDEO: In this brief video, learn how Orrstown Bank uses cloud computing to keep their services readily available, as well as easily detect patterns of fraud. Tune in to see this cloud computing strategy in action.
Posted: 06 Apr 2016 | Premiered: 06 Apr 2016

Splunk

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

Zero-Day Attacks: Why you need a Deeper Level of Inspection
sponsored by Check Point Software Technologies Ltd.
VIDEO: Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.
Posted: 25 Mar 2016 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

How Digital Transformation Is Changing the Role of the Data Center
sponsored by Dimension Data
VIDEO: In this exclusive webcast, Editor-in-Chief at Computer Weekly Brian Glick demonstrates how digital transformation is significantly affecting the role of the enterprise data center. Tune in to ensure competitive longevity by modernizing your data center architectures with cloud-enabled, scalable deployments.
Posted: 18 Mar 2016 | Premiered: 18 Mar 2016

Dimension Data

Closing the Cybersecurity Gap
sponsored by Palo Alto Networks
WEBCAST: This webcast assesses the growing risk that hackers pose to your enterprise. Watch now to learn about improving your overall security response, from advanced detection tools to creating safer networks that are more immune to attack.
Posted: 12 Apr 2016 | Premiered: Apr 12, 2016

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement