Fraud Technologies BuysWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Fraud Technologies Buys returned the following results.
RSS What is RSS?
Related Categories

 •   Fraud Detection & Prevention
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Identity Management/ User Provisioning
 •   Network Security
 •   Security Monitoring
 •   Authentication / Password Management
 •   Endpoint Security
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security

Related Searches
 •   Balancing Fraud
 •   Concerns Fraud Technologies Buys
 •   Electronic Fraud Technologies Buys
 •   Fraud Technologies Arkansas
 •   Fraud Technologies Buys Display
 •   Fraud Technologies Repair
 •   Fraud Technologies Requirement
 •   Samples Fraud Technologies Buys
 •   Uk Fraud Technologies Buys
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Justifying Your Technology Investments Through ROI by KnowledgeStorm Webinars (E-mail this company)

April 27, 2004 - (Free Research)
As budgets stay tight and finance professionals become more involved in technology buying decisions, be better prepared to defend your business case through the use of financial metrics and Return on Investment (ROI) calculators. 
(WEBCAST) READ ABSTRACT |

Learning How To Learn Hadoop by Global Knowledge

February 05, 2013 - (Free Research)
Like the problems it solves, Hadoop can be quite complex and challenging. Access this exclusive resource to join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 22, 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

The Future of Authentication for Online Services by SafeNet, Inc.

November 02, 2009 - (Free Research)
In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 12, 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Book: Technical Guide on Network Security Monitoring by SearchMidMarketSecurity

May 17, 2010 - (Free Research)
SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit. 
(EBOOK) READ ABSTRACT |

Making a Business Case for Fraud Prevention Technology by IBM

December 31, 2013 - (Free Research)
This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions. 
(WHITE PAPER) READ ABSTRACT |

Transforming Government Fraud Detection and Prevention by Information Builders

May 01, 2013 - (Free Research)
View this white paper to learn more about the challenges you could face related to fraud and abuse that has the potential to lead to billions of dollars lost for your business. Oftentimes, government institutions lack the resources to prevent fraud, waste and abuse (FWA.) Find a solution to this obstacle by reading this resource now. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

Webinar: IBM IIM for Fraud, Abuse and Waste in Government by IBM

April 2014 - (Free Research)
Tune into the following webinar to explore the challenges and opportunities within the current state of fraud reduction, waste, and abuse in government programs and agencies. Also gain access to technology recommendations and more. 
(WEBCAST) READ ABSTRACT |

VeriSign® Identity Protection Fraud Detection Service by VeriSign EMEA

November 2008 - (Free Research)
This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide to Antimalware by AVG Technologies USA, Inc.

November 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

Inside IBM Intelligent Investigation Manager by IBM

November 2012 - (Free Research)
Sit back for five minutes to watch this video and catch an inside look at a technology designed to protect your organization from fraud, which is more malicious and easier than ever across today's expansive IT and business operations. 
(VIDEO) READ ABSTRACT |

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months by MarkMonitor

October 2008 - (Free Research)
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month. 
(CASE STUDY) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

New Storage Buying Criteria for Shared Virtual Infrastructure by NetApp

September 2010 - (Free Research)
You can’t make the best storage decisions for your business if you’re not asking the right questions. Our “New Storage Buying Criteria for Shared Virtual Infrastructure RFP template” makes it easy. Use it to help ensure the solutions you choose can deliver extreme flexibility and efficiency, and a “future-proof” foundation. 
(WHITE PAPER) READ ABSTRACT |

Technology industry at the cross-roads: Transforming quote-to-cash operations by ComputerWeekly.com

March 2013 - (Free Research)
This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technology industry at the cross-roads: Transforming quote-to-cash operations by ComputerWeekly.com

March 2013 - (Free Research)
This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Aite Group analyst Paper: Investigation Management for Insurance: Catch Fraud More Efficiently by IBM

October 2013 - (Free Research)
View this resource to learn how to create an integrated fraud management program for your business. 
(WHITE PAPER) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com

August 2009 - (Free Research)
As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more. 
(EBOOK) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts