IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Management Reports
 
Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

The Potential ROI of Fraud Detection and Prevention Tools
sponsored by BAE Systems
RESEARCH CONTENT: This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.
Posted: 03 Mar 2017 | Published: 31 May 2016

BAE Systems

Transforming Government Fraud Detection and Prevention
sponsored by Information Builders
WHITE PAPER: View this white paper to learn more about the challenges you could face related to fraud and abuse that has the potential to lead to billions of dollars lost for your business. Oftentimes, government institutions lack the resources to prevent fraud, waste and abuse (FWA.) Find a solution to this obstacle by reading this resource now.
Posted: 01 May 2013 | Published: 01 May 2013

Information Builders

Financial Crime Survey: Prioritizing Compliance, AML, and Fraud Detection
sponsored by BAE Systems
RESEARCH CONTENT: Investment in financial crime defenses is increasing, most significantly in AML and non-AML compliance. Access this financial crime survey report to discover how financial crime prevention priorities are shifting and why the move to consolidation between fraud and compliance solutions is leading the trend.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

BAE Systems

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Securities and capital markets
sponsored by IBM
WHITE PAPER: IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER: Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement