IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Retail Fraud Protection

RSS Feed    Add to Google    Add to My Yahoo!
Retail Fraud Protection Multimedia (View All Report Types)
 
IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Experiences from the Field - Detailed Data Security Case Study
sponsored by IBM
VIDEO: Watch this exclusive video to hear from Product Marketing integration and governance specialist, Jeff Scheepers of IBM to learn more about the new emphasis being placed on database security in today's business landscape. Continue to watch hear about industry leaders' security issues and how they were able to resolve them.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Strategies to Ensure Software Security
sponsored by Veracode, Inc.
WEBCAST: In this webcast, you will learn the strategies to ensuring software security and reliability and how to choose a platform that won't fail down the line. Watch now to gain insider tips and guidance.
Posted: 27 Feb 2015 | Premiered: Nov 7, 2014

Veracode, Inc.

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WEBCAST: In this webcast, discover several top use cases for application virtualization, complete with real world customer examples. Additionally, learn about common business challenges facing the industry today.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Citrix

Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST: Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement