IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Detection Reports
 
Evaluating Netsuit Suitecommerce
sponsored by ComputerWeekly.com
ANALYST REPORT: NetSuite recently announced SuiteCommerce, a unified platform that enables businesses to centrally manage all aspects of their e-commerce and optimize interactions regardless of device or location, Nucleus Research reports.
Posted: 26 Jul 2012 | Published: 05 Jun 2012

ComputerWeekly.com

Avoid Overlooking the Growing Fraud Threat When Planning AP Automation
sponsored by SAP America, Inc.
WHITE PAPER: This paper discusses how automated AP can help reduce a great portion of frauds and schemes with less human "touch points" involved in invoice processing which translates to less chances for dishonest employees to falsify invoice data or otherwise manipulate the AP process for personal gain.
Posted: 11 Dec 2009 | Published: 11 Dec 2009

SAP America, Inc.

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

What is FakeAV?
sponsored by Sophos, Inc.
WHITE PAPER: FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
Posted: 25 Jun 2010 | Published: 24 May 2010

Sophos, Inc.

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

Real-time Transaction Inspection
sponsored by Oversight Systems
SOFTWARE LISTING: Oversight Systems automates the analysis and testing of auditors and fraud examiners to reduce ongoing Sarbanes-Oxley compliance costs and provide quality assurance for financial operations.
Posted: 15 Aug 2008 | Published: 14 Aug 2008

Oversight Systems

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement