IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud

RSS Feed    Add to Google    Add to My Yahoo!
FraudReports
 
Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a device-based solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Financial Services Company Saves $5M Annually with iovation's Fraud Prevention Service
sponsored by iovation, Inc.
CASE STUDY: Discover how a major lending company uses device-based fraud prevention to protect customers and stop sophisticated loan fraud rings.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

Time to Get Rid of Big Paper
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief white paper highlights the banking industry's challenges with big paper – paper-based processes. Click now to see how digitizing some of this, traditionally, paper-based information can significantly improve customer relationships, aid regulatory compliance, and reduce risks of fraud.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Hewlett-Packard Company

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

IBM Fraud Analytics for end-to-end insight across the business
sponsored by IBM
WEBCAST: Access the following webcast to gain a firsthand look predictive analytics to discover how this technology is helping to solve the worldwide crisis of fraud. Uncover the various potential stemming from this technology and how it can truly benefit you and your organization.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

IBM

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement