Fraud Technologies SimpleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Fraud Technologies Simple returned the following results.
RSS What is RSS?
Related Categories

 •   Fraud Detection & Prevention
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Identity Management/ User Provisioning
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Authentication / Password Management
 •   Access Control

Related Searches
 •   Based Fraud Technologies
 •   Fraud Technologies Networking
 •   Fraud Technologies Simple Distributions
 •   Fraud Technologies Simple Graphs
 •   Fraud Technologies Simple Pos
 •   Fraud Technologies Simple Risks
 •   Fraud Technologies Simple Sample
 •   Industries Fraud Technologies
 •   Issues Fraud Technologies Simple
 •   Notes About Fraud
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Imprivata OneSign Streamlines Workflows at Augusta Health by Imprivata

June 24, 2013 - (Free Research)
This brief video explores how Augusta Health leveraged a single sign on technology to increase care providers' efficiency while also improving the protection of patients' confidential information. 
(VIDEO) READ ABSTRACT |

Virtualize Now with Dell | EMC CX4 and VMware vSphere 4.0 by Dell | EMC

November 03, 2009 - (Free Research)
Deploying Dell’s enterprise solutions, including Dell|EMC CX4 Muti-Protocol SANs, 11th generation PowerEdge Virtualization Optimized Servers and Global Infrastructure Consulting Services (GICS) can help organizations confidently deploy, manage and protect your VMware vSphere 4.0 enviornment. Read this paper to learn more! 
(PRODUCT OVERVIEW) READ ABSTRACT |

Deploying and Protecting Microsoft Applications with Dell Equallogic and Vmware vSphere 4.0 Integrated, Scalable and Cost: Effective Cloud-Like IT Environments for Your Mission Critical Applications by Dell, Inc.

September 23, 2009 - (Free Research)
Dell’s enterprise solutions, including EqualLogic iSCSI SANs, PowerEdge Virtualization Servers and Global Infrastructure Consulting Services (GICS) can help organizations confidently deploy, manage and protect their Tier-1 Microsoft® applications within a VMware vSphere environment. 
(WHITE PAPER) READ ABSTRACT |

Deploying and Protecting Microsoft Applications with Dell Equallogic and Vmware vSphere 4.0 Integrated, Scalable and Cost: Effective Cloud-Like IT Environments for Your Mission Critical Applications by Dell, Inc.

September 23, 2009 - (Free Research)
Dell’s enterprise solutions, including EqualLogic iSCSI SANs, PowerEdge Virtualization Servers and Global Infrastructure Consulting Services (GICS) can help organizations confidently deploy, manage and protect their Tier-1 Microsoft® applications within a VMware vSphere environment. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Large CompaniesUse Automated Travel andExpense Management Solutions by Concur Technologies (E-mail this company)

September 30, 2013 - (Free Research)
This resources gives the most frequent reasons organizations adopt an automated travel and expense management solution. These reasons included improved security, compliance, and reduced costs. 
(WHITE PAPER) READ ABSTRACT |

Data Quality and Identity Resolution by Informatica

May 2008 - (Free Research)
This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications. 
(WHITE PAPER) READ ABSTRACT |

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle with IBM InfoSphere Guardium by IBM

September 2010 - (Free Research)
Read this paper to find out what solutions optimize operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Making a Business Case for Fraud Prevention Technology by IBM

December 2013 - (Free Research)
This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions. 
(WHITE PAPER) READ ABSTRACT |

Transforming Government Fraud Detection and Prevention by Information Builders

May 2013 - (Free Research)
View this white paper to learn more about the challenges you could face related to fraud and abuse that has the potential to lead to billions of dollars lost for your business. Oftentimes, government institutions lack the resources to prevent fraud, waste and abuse (FWA.) Find a solution to this obstacle by reading this resource now. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Strategic guide to insider threat detection and breach response by Imperva

March 2011 - (Free Research)
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan. 
(EGUIDE) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

CWAT Data Loss Prevention - Whitepaper/Technical Review by Software Engineering of America, Inc.

February 2008 - (Free Research)
CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks. 
(WHITE PAPER) READ ABSTRACT |

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by AVG Technologies USA, Inc.

March 2010 - (Free Research)
The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs. 
(CASE STUDY) READ ABSTRACT |

VeriSign® Identity Protection Fraud Detection Service by VeriSign EMEA

November 2008 - (Free Research)
This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats. 
(WHITE PAPER) READ ABSTRACT |

Inside IBM Intelligent Investigation Manager by IBM

November 2012 - (Free Research)
Sit back for five minutes to watch this video and catch an inside look at a technology designed to protect your organization from fraud, which is more malicious and easier than ever across today's expansive IT and business operations. 
(VIDEO) READ ABSTRACT |

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months by MarkMonitor

October 2008 - (Free Research)
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month. 
(CASE STUDY) READ ABSTRACT |

Aite Group analyst Paper: Investigation Management for Insurance: Catch Fraud More Efficiently by IBM

October 2013 - (Free Research)
View this resource to learn how to create an integrated fraud management program for your business. 
(WHITE PAPER) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

Fighting Fraud on Fridays by IBM

January 2014 - (Free Research)
View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe. 
(WEBCAST) READ ABSTRACT |

IBM Intelligent Investigation Manager by IBM

March 2013 - (Free Research)
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases. 
(WEBCAST) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts