IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Management White Papers (View All Report Types)
 
CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER: Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009

FireEye

Winning the PCI Compliance Battle
sponsored by Qualys, Inc.
WHITE PAPER: Learn about the payment card industry (PCI) including, participation and validation requirements, compliance requirements of PCI Data Security Standard, validation enforcement and the three important things to look for in a PCI network scanning service.
Posted: 19 Mar 2007 | Published: 01 Oct 2006

Qualys, Inc.

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

Achieving PCI Compliance in Complex Payment Networks
sponsored by LogLogic, Inc.
WHITE PAPER: Discover how next generation log management and intelligence (LMI) reduces the cost and complexity of PCI compliance and how using IT controls such as COBIT, ITIL and ISO answers many compliance mandates.
Posted: 13 Nov 2006 | Published: 01 Jul 2006

LogLogic, Inc.

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER: Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

SSL: The Backbone of Doing Business over the Internet
sponsored by VeriSign, Inc
WHITE PAPER: Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust.
Posted: 17 Feb 2014 | Published: 01 Oct 2008

VeriSign, Inc

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement