IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Fraud DetectionWhite Papers (View All Report Types)
 
IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

IBM

Monitoring for SAP: High-Risk Financial Transactions in Real Time
sponsored by Security Weaver
WHITE PAPER: For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP.
Posted: 24 Sep 2008 | Published: 06 Feb 2009

Security Weaver

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER: Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement