IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud Detection Multimedia (View All Report Types)
 
Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Don't let legacy infrastructure be your legacy
sponsored by Insight and Red Hat
VIDEO: This video explains the advantages of using open, secure infrastructure software to upgrade your legacy infrastructure, including more uptime and seamless app migration. Watch and learn why 90% of Fortune 500 companies rely on infrastructure software as the foundation for their IT infrastructure.
Posted: 19 Dec 2014 | Premiered: 23 May 2014

Insight and Red Hat

Thrive, Survive or Perish - Compute Economics in the New Style of IT
sponsored by HP & Intel® (Processeur Intel® Xeon®)
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the workload and data analytics pressures and obstacles presented today.
Posted: 29 Dec 2014 | Premiered: Nov 24, 2014

HP & Intel® (Processeur Intel® Xeon®)

Best Practices to Secure your Virtual App & Desktop Solutions
sponsored by Citrix
WEBCAST: This exclusive webcast will detail how you can keep your virtual applications and desktop solutions safe.
Posted: 27 Jan 2015 | Premiered: Oct 14, 2014

Citrix

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

IIJ Global Singapore Powers Up Cloud Solution Management with CA Unified Infrastructure Management
sponsored by CA Technologies.
WEBCAST: In this white paper, explore how IIJ Global Singapore, a subsidiary of the leading internet access and network solutions provider, leveraged a unified monitoring platform to give customers a single-pane-of-glass view. Read on to learn how this platform can increase visibility in your organization.
Posted: 29 Dec 2014 | Premiered: Oct 9, 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement