IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud Detection Multimedia (View All Report Types)
 
Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

What We Can Learn from Recent Data Breaches and the ShellShock Vulnerability
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

A Cyber Security Health Check
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: This informative webcast outlines how to make sure your healthcare cyber security is effective, and how to handle healthcare compliance.
Posted: 30 Jun 2015 | Premiered: Jun 30, 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Security Predictions for 2015
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: This webcast takes a look at the top security incidents and breaches over the past year and predicts how the cybersecurity landscape will develop for 2015.
Posted: 30 Jun 2015 | Premiered: Dec 11, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

An Inside Look into CA Workload Automation
sponsored by CA Technologies.
VIDEO: This video and accompanying demonstration offer an inside look into a workload automation tool that allows you to manage business processes from a single point of control.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

CA Technologies.

Free Demo: Enhancing Data Protection with Enterprise Storage Management
sponsored by IBM
SOFTWARE DEMO: Take a look at this free demo to discover how the right storage manager can help you overcome the challenges of enterprise data protection.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement