IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Protection

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud Protection Multimedia (View All Report Types)
IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013


Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009


Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014


Classify and Secure All Your Sensitive Data
sponsored by Identity Finder, LLC
VIDEO: This brief video describes how you can find and protect all of your sensitive data for the utmost security and compliance.
Posted: 12 Oct 2015 | Premiered: 27 Dec 2013

Identity Finder, LLC

Single-Source, Comprehensive Technical Support for Hardware Maintenance
sponsored by IBM
VIDEO: This video discusses how third party support can consolidate your hardware to a couple vendors that only need maintenance a few times a year. Watch now to discover how this service can streamline your maintenance needs with a single point of contact, allowing you to predict your hardware support requirements and weigh risks ahead of time.
Posted: 11 Nov 2015 | Premiered: 29 Sep 2014


Unified Security for Today's Enterprise
sponsored by BitDefender
VIDEO: Watch this video to explore a unified approach to security that addresses the needs of virtual, physical, and mobile devices in your environment.
Posted: 06 Oct 2015 | Premiered: 03 Jun 2013


Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO: This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement