IT Management  >   Systems Operations  >   Security  >   Security Management  >  


RSS Feed    Add to Google    Add to My Yahoo!
Fraud Reports
Time to Get Rid of Big Paper
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief white paper highlights the banking industry's challenges with big paper – paper-based processes. Click now to see how digitizing some of this, traditionally, paper-based information can significantly improve customer relationships, aid regulatory compliance, and reduce risks of fraud.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Hewlett Packard Enterprise

Mobile Security Strategies
sponsored by
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

Cybercrime and warfare: All that matters
sponsored by
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Transforming Government Fraud Detection and Prevention
sponsored by Information Builders
WHITE PAPER: View this white paper to learn more about the challenges you could face related to fraud and abuse that has the potential to lead to billions of dollars lost for your business. Oftentimes, government institutions lack the resources to prevent fraud, waste and abuse (FWA.) Find a solution to this obstacle by reading this resource now.
Posted: 01 May 2013 | Published: 01 May 2013

Information Builders

Tactics to combat insider threat
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

Evaluating Netsuit Suitecommerce
sponsored by
ANALYST REPORT: NetSuite recently announced SuiteCommerce, a unified platform that enables businesses to centrally manage all aspects of their e-commerce and optimize interactions regardless of device or location, Nucleus Research reports.
Posted: 26 Jul 2012 | Published: 05 Jun 2012

Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013


Compliant Statement Archiving and Presentment for Financial Services
sponsored by EMC Corporation
WHITE PAPER: Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

EMC Corporation

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement