IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Credit Card Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Credit Card Fraud White Papers (View All Report Types)
 
Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 27 Mar 2014 | Published: 31 Oct 2013

IBM

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks
sponsored by Cyveillance
WHITE PAPER: Phishing has become one of the most common and effective online scams and can cost your company thousands of dollars. Download this new white paper and discover seven key objectives of an effective phishing protection and response plan.
Posted: 14 Nov 2006 | Published: 01 Apr 2006

Cyveillance

Portal Authentication: A Balancing Act Between Security, Usability & Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the problems with current authentication systems and the drivers that should be motivating organizations of all sizes to improve their access controls.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

VeriSign® Identity Protection Fraud Detection Service
sponsored by VeriSign EMEA
WHITE PAPER: This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

Using Data Mining to Detect Insurance Fraud
sponsored by IBM
WHITE PAPER: Insurers lose millions each year through fraudulent claims. This paper explains how leading insurance companies are using data mining techniques to find fraudulent claims. Read on to learn how to combine powerful analytics with your existing fraud detection and prevention efforts.
Posted: 18 Nov 2010 | Published: 18 Nov 2010

IBM

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Data, Disconnected: Communications Firms Take the Necessary Steps to Build Greater Accuracy into Their Customer Management Processes
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper for the communications sector examines how inaccurate data can impact customer relationships and how implementing a multi-phase process can help feed cleaner customer data into enterprise solutions to maximize return on investment.
Posted: 20 Jan 2009 | Published: 20 Jan 2009

Pitney Bowes Group 1 Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement