IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Credit Card Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Credit Card FraudReports
 
A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

Learning How To Learn Hadoop
sponsored by Global Knowledge
WHITE PAPER: Like the problems it solves, Hadoop can be quite complex and challenging. Access this exclusive resource to join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path.
Posted: 05 Feb 2013 | Published: 05 Feb 2013

Global Knowledge

The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.
Posted: 12 Nov 2009 | Published: 18 Mar 2009

RSA, The Security Division of EMC

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Monitoring for SAP: High-Risk Financial Transactions in Real Time
sponsored by Security Weaver
WHITE PAPER: For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP.
Posted: 24 Sep 2008 | Published: 06 Feb 2009

Security Weaver

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Winning the PCI Compliance Battle
sponsored by Qualys, Inc.
WHITE PAPER: Learn about the payment card industry (PCI) including, participation and validation requirements, compliance requirements of PCI Data Security Standard, validation enforcement and the three important things to look for in a PCI network scanning service.
Posted: 19 Mar 2007 | Published: 01 Oct 2006

Qualys, Inc.

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA, The Security Division of EMC
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA, The Security Division of EMC

Alternative Managed Accounts White Paper
sponsored by Advent Software, Inc
WHITE PAPER: Read this paper to learn the six essential pillars of a successful managed account platform and the technology required to support it.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Advent Software, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement