IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud Management White Papers (View All Report Types)
 
A New Aproach to Payment Verification
sponsored by Nexmo
WHITE PAPER: This white paper explores how to use phone number verification to ensure security and compliance in a simple process. Access now to learn why this technology is rising in prominence and uncover the seven key components to look for in a third-party service.
Posted: 27 Apr 2015 | Published: 11 Mar 2015

Nexmo

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by White Hat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 16 Apr 2015 | Published: 18 Dec 2014

White Hat Security

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business
sponsored by RSA
WHITE PAPER: This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.
Posted: 12 Nov 2009 | Published: 18 Mar 2009

RSA

Client Case Study: MoneyGram International
sponsored by IBM
WHITE PAPER: This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Monitoring for SAP: High-Risk Financial Transactions in Real Time
sponsored by Security Weaver
WHITE PAPER: For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP.
Posted: 24 Sep 2008 | Published: 06 Feb 2009

Security Weaver

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER: Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley
sponsored by Oversight Systems
WHITE PAPER: Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Oversight Systems

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement