IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Protection

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Protection White Papers (View All Report Types)
1 - 25 of 67 Matches Previous Page  |  Next Page
Online Fraud Benchmark Report
sponsored by CyberSource
WHITE PAPER: To advance Australia's management of online fraud and business optimization, this online fraud benchmark report examines the country's state on these matters. Learn what 197 business professionals who make fraud management decisions had to say about e-commerce and how it affects selling goods or services online.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

CyberSource

Fraud risk engines strike back
sponsored by IBM
WHITE PAPER: Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.
Posted: 10 Jun 2016 | Published: 01 Feb 2016

IBM

Fraud protection doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: You can simplify the fraud protection process while reducing time and cost. Learn how to achieve greater visibility and adaptability across the fraud management lifecycle and discover highly effective intelligence- and evidence-based fraud detection with fewer false positives.
Posted: 10 Jun 2016 | Published: 01 May 2016

IBM

6 Tips to Help Reduce Costs and Boost Productivity
sponsored by Kronos Incorporated
WHITE PAPER: Automating labor-related functions allows for process simplification and significant bottom-line results. Discover 6 quick and easy tips to manage your workforce effectively for better business results.
Posted: 09 Jun 2016 | Published: 31 Dec 2014

Kronos Incorporated

Battling fraud at the root cause
sponsored by IBM
WHITE PAPER: Battling malware-driven fraud requires real-time, adaptable and transparent solutions for prevention, detection, mitigation and remediation that span every point of your interaction. Discover how cybercriminals circumvent security measures at each stage of the transaction lifecycle and learn strategies to combat these attacks.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

IBM

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

Keep Your Customers Safe from Phishing
sponsored by Symantec Website Security Solutions
WHITE PAPER: This brief white paper presents one possible solution to the problem of phishing and helps you ensure the safety of your customers' data.
Posted: 20 Mar 2015 | Published: 31 Dec 2013

Symantec Website Security Solutions

Financial Malware Explained
sponsored by IBM
WHITE PAPER: This white paper gets you inside the head of a fraudster and gives you insight into how they work.
Posted: 25 Feb 2015 | Published: 31 Dec 2014

IBM

The Next Generation of Fraud Detection
sponsored by IBM
WHITE PAPER: This white paper describes how system provides advanced fraud detection to combat more threats.
Posted: 24 Feb 2015 | Published: 30 Nov 2014

IBM

Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper focuses on one of the most prevalent form of cybercrime – online banking fraud. Learn the steps cyber criminals take to gain access to your personal information.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Phishing Tactics
sponsored by Symantec Website Security Solutions
WHITE PAPER: This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Posted: 12 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Website Security Solutions

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Uncovering Bust-Out Fraud with FICO Identity Resolution Engine
sponsored by FICO
WHITE PAPER: Discover how a powerful new social link analysis technology can help banks improve detection of bust-out fraud perpetrators, and better protect their funds.
Posted: 11 Jun 2014 | Published: 31 Dec 2013

FICO

Can Fraud Alerts Raise Customer Loyalty?
sponsored by FICO
WHITE PAPER: The following white paper discusses how leading banks are driving gains by managing individual customer experiences as part of fraud intervention. Learn about the results these banks are seeing in terms of better fraud protection, improved efficiency, and higher customer satisfaction.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

FICO

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

SSL: The Backbone of Doing Business over the Internet
sponsored by VeriSign, Inc
WHITE PAPER: Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust.
Posted: 17 Feb 2014 | Published: 01 Oct 2008

VeriSign, Inc
1 - 25 of 67 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement