IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud ManagementReports
 
Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER: Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009

FireEye

ebizQ.net Tip Guide: Evolving your dynamic case management strategy
sponsored by IBM
EGUIDE: This Tip Guide describes how DCM can benefit financial services firms and offers expert advice on best practices and pitfalls in DCM adoption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

IBM

Data Quality and Identity Resolution
sponsored by Informatica
WHITE PAPER: This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications.
Posted: 18 Jun 2008 | Published: 30 May 2008

Informatica

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER: Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Data, Disconnected: Communications Firms Take the Necessary Steps to Build Greater Accuracy into Their Customer Management Processes
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper for the communications sector examines how inaccurate data can impact customer relationships and how implementing a multi-phase process can help feed cleaner customer data into enterprise solutions to maximize return on investment.
Posted: 20 Jan 2009 | Published: 20 Jan 2009

Pitney Bowes Group 1 Software

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement