IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed   
Fraud Management Reports
 
Top 10 enterprise IT in the Benelux region stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

ComputerWeekly.com

Best Practices for E-Commerce and Retail Fraud Management
sponsored by Pipl
ANALYST REPORT: E-commerce and retail fraud management forces security and risk pros to balance the business need for frictionless customer experiences with fraud avoidance. Inside this Forrester report, discover guidance on how to maintain this precarious balance.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

New Measure to Strengthen the Prevention of Money Laundering and Terrorism Financing
sponsored by LexisNexis® Risk Solutions
RESOURCE: In the past four years, since the 4th EU Anti-MoneyLaundering Directive (AMLD) was issued, the world has seen numerous events and scandals take place such as Panama and Paradise Papers, Middle East migration crisis and human trafficking, and various lone wolf and organized terrorist attacks across Europe.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

LexisNexis® Risk Solutions

Insurance Fraud Prevention & Detection
sponsored by Actico
WHITE PAPER: For insurance providers, automation and machine learning provide the ability to process claims at unmatched speed, detect and prevent insurance fraud, and more. Read this white paper to learn more about ACTICO, an insurance claims platform that embraces automation and machine learning capabilities.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Actico

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

Evaluating the True Impact of Fraud on Financial Institution
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Threat and Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper explores these features, and the challenges that organizations face related to making sense of information in order to revolutionize their ability to mitigate threat and fraud.
Posted: 26 Jul 2011 | Published: 26 Jul 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info