Fraud Detection & PreventionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsFraud Detection & Prevention  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 155 | Next Page

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line by BeyondTrust Corporation

February 16, 2009 - (Free Research)
Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation. 
(WHITE PAPER) READ ABSTRACT |

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

IT Executive Guide to Security Intelligence by IBM

February 24, 2011 - (Free Research)
In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security. 
(WHITE PAPER) READ ABSTRACT |

Unlocking the Opportunity of SIEM Technology by SearchSecurity.com

April 25, 2013 - (Free Research)
Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities. 
(EGUIDE) READ ABSTRACT |

The various ways to fight new and emerging cybercrime by SearchSecurity.com

November 29, 2011 - (Free Research)
Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company. 
(EGUIDE) READ ABSTRACT |

How to prevent phishing attacks: User awareness and training by SearchSecurity.com

October 26, 2011 - (Free Research)
This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing. 
(EGUIDE) READ ABSTRACT |

Best Practices for Preventing Malware by SearchSecurity.com

November 21, 2011 - (Free Research)
Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers. 
(EGUIDE) READ ABSTRACT |

Client Case Study: London Borough of Brent by IBM

July 28, 2011 - (Free Research)
This paper discusses how Brent used IBM to supply the customer data integration and master data management (MDM) to consolidate back-end systems to reduce administration costs, improve customer service and minimise benefit fraud. 
(WHITE PAPER) READ ABSTRACT |

HP TippingPoint: Next Generation Intrusion Prevention System by Hewlett-Packard Company

August 27, 2012 - (Free Research)
Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

CWAT Data Loss Prevention - Whitepaper/Technical Review by Software Engineering of America, Inc.

September 2006 - (Free Research)
CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks. 
(WHITE PAPER) READ ABSTRACT |

Client Case Study: MoneyGram International by IBM

August 2011 - (Free Research)
This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud. 
(WHITE PAPER) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

July 2009 - (Free Research)
Many network monitoring products are easy to install and give you basic tools for managing your network, but achieving and maintaining compliance with the latest version of the PCI DSS requires a network solution that can manage unprecedented levels of change and complexity. Read this whitepaper to learn more about one such solution. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Red Flag Rules Compliance by Gemalto

September 2010 - (Free Research)
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims. 
(EBOOK) READ ABSTRACT |

Learning How To Learn Hadoop by Global Knowledge

February 2013 - (Free Research)
Like the problems it solves, Hadoop can be quite complex and challenging. Access this exclusive resource to join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Phishing and the Underground Economy by MarkMonitor

January 2009 - (Free Research)
This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months by MarkMonitor

October 2008 - (Free Research)
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month. 
(CASE STUDY) READ ABSTRACT |

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved by MarkMonitor

October 2008 - (Free Research)
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Information Sharing: Establishing New Protocols by BMC Software, Inc.

December 2012 - (Free Research)
This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more. 
(EGUIDE) READ ABSTRACT |

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

Password Management Survey by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution, can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

Maintaining Control & Compliance in the Cloud with Data-Centric Security by SafeNet, Inc.

March 2010 - (Free Research)
With promises of flexibility, ease of use, and lower costs, Service Oriented Architectures (SOA) and Virtualization are leading IT to the new outsourced computing model known as Cloud. This session will provide details on the impact of Cloud on information security and the data-centric solutions for specific use-cases. 
(WEBCAST) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

The Future of Authentication for Online Services by SafeNet, Inc.

November 2009 - (Free Research)
In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks. 
(WHITE PAPER) READ ABSTRACT |

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders by Information Security Magazine

August 2011 - (Free Research)
This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market. 
(EZINE)

1 - 25 of 155 | Next Page

> Explore alternative searches for: Fraud Detection & Prevention

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts