IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Internet Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Internet Fraud White Papers (View All Report Types)
10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Time to Get Rid of Big Paper
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief white paper highlights the banking industry's challenges with big paper – paper-based processes. Click now to see how digitizing some of this, traditionally, paper-based information can significantly improve customer relationships, aid regulatory compliance, and reduce risks of fraud.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Hewlett Packard Enterprise

The Last Mile of Analytics: Where it is, and Where it's Going
sponsored by O'Reilly Media
WHITE PAPER: Today's users demand self-service capabilities. Access this report to learn how vendors are meeting this demand, and how you can leverage emerging analytic features for real-world business scenarios.
Posted: 27 Oct 2015 | Published: 29 May 2015

O'Reilly Media

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007


Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER: Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009


IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011


Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009


Winning the PCI Compliance Battle
sponsored by Qualys, Inc.
WHITE PAPER: Learn about the payment card industry (PCI) including, participation and validation requirements, compliance requirements of PCI Data Security Standard, validation enforcement and the three important things to look for in a PCI network scanning service.
Posted: 19 Mar 2007 | Published: 01 Oct 2006

Qualys, Inc.

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement