IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Fraud ManagementReports
 
Electronics Retailer Reduces Order Fraud by 25% with iovation
sponsored by iovation, Inc.
WHITE PAPER: A major computer and electronics retailer fights back against identity theft and credit card fraud, by adding device intelligence into their fraud prevention strategy. Find out how it works behind the scenes.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

SG North Tackles Chargebacks and Terms of Service Violations
sponsored by iovation, Inc.
CASE STUDY: An online game development and publishing company shares how it keeps its games safe for players, and keeps fraudsters away.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

How HP Combatted Fraud and Increased Customer Satisfaction at a Top Banking Group
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, learn how one bank implemented a fraud management security platform that was able to meet the growing scale of customers, while providing clear visibility into transaction activity over a range of channels. Click now to see how else they're benefiting.
Posted: 18 Nov 2013 | Published: 31 Jul 2013

Hewlett-Packard Company

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

What is FakeAV?
sponsored by Sophos, Inc.
WHITE PAPER: FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
Posted: 25 Jun 2010 | Published: 24 May 2010

Sophos, Inc.

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
sponsored by IBM
WHITE PAPER: This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

How Master Data Management Serves the Business
sponsored by IBM
WHITE PAPER: This white paper explores the three major approaches that leading organizations use to put master data to work for the business and learn how to leverage a single view of your enterprise to reduce costs, increase agility and support compliance.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Alternative Managed Accounts White Paper
sponsored by Advent Software, Inc
WHITE PAPER: Read this paper to learn the six essential pillars of a successful managed account platform and the technology required to support it.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Advent Software, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement