Fraud Technologies SolutionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Fraud Technologies Solution returned the following results.
RSS What is RSS?
Related Categories

 •   Fraud Detection & Prevention
 •   Data Security
 •   Data Center Management
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Application Management and Maintenance
 •   Enterprise Systems Management
 •   Identity Management/ User Provisioning
 •   Customer Information Management/ Customer Databases
 •   Network Security

Related Searches
 •   Calls Fraud Technologies
 •   Capacity Fraud Technologies
 •   Financial Fraud Technologies Solution
 •   Fraud Manager
 •   Fraud Technologies Definition
 •   Fraud Technologies Recovery
 •   Fraud Technologies Solution Concerns
 •   Fraud Technologies Solution Measured
 •   Learning About Fraud Technologies
 •   Net Fraud
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

First National Technology Solutions - Service provider expands target market with enhanced cloud infrastructure by EMC Corporation

November 11, 2011 - (Free Research)
In this case study, First National Technology Solutions' outdated infrastructure was modernized for company growth. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Evaluating Technology Solution Options For a Desktop Virtualization Pilot by Dell, Inc. and Intel®

July 12, 2010 - (Free Research)
For the purposes of this learning series, the speakers will discuss the pros of using Dell hardware with Intel processors along with Citrix's XenDesktop 4 for desktop virtualization. The session will also review how Dell is currently working with Citrix to package the XenDesktop Quick PoC Kit into their POC offering. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Frost and Sullivan: Customer Experience Management: A Business Imperative beyond a Technology Solution by Hewlett-Packard Company

February 22, 2010 - (Free Research)
In this white paper, Frost & Sullivan, a global consulting and research firm, shares real-world insights from its latest comprehensive study of the value of CEM, including operator strategies driving adoption, best practices and KPIs, and a glimpse into the future of CEM. 
(WHITE PAPER) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 12, 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” by Information Security Magazine

March 04, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology. 
(EZINE)

Making a Business Case for Fraud Prevention Technology by IBM

December 31, 2013 - (Free Research)
This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions. 
(WHITE PAPER) READ ABSTRACT |

Guide to Implementing VMware View by VMware, Inc.

July 26, 2013 - (Free Research)
This resource outlines the successful design and implementation of a 100% virtualized environment, capped with a real world example to strategically implement the power of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Transforming Government Fraud Detection and Prevention by Information Builders

May 01, 2013 - (Free Research)
View this white paper to learn more about the challenges you could face related to fraud and abuse that has the potential to lead to billions of dollars lost for your business. Oftentimes, government institutions lack the resources to prevent fraud, waste and abuse (FWA.) Find a solution to this obstacle by reading this resource now. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Moving to DevOps Speeds Deployment and Boosts ROI by IBM

November 2013 - (Free Research)
This essential e-guide highlights the benefits of a DevOps approach and explores how businesses can successfully integrate their teams to increase collaboration, streamline testing processes and reduce risks. 
(EGUIDE) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

VeriSign® Identity Protection Fraud Detection Service by VeriSign EMEA

November 2008 - (Free Research)
This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats. 
(WHITE PAPER) READ ABSTRACT |

Webinar: IBM IIM for Fraud, Abuse and Waste in Government by IBM

April 2014 - (Free Research)
Tune into the following webinar to explore the challenges and opportunities within the current state of fraud reduction, waste, and abuse in government programs and agencies. Also gain access to technology recommendations and more. 
(WEBCAST) READ ABSTRACT |

Inside IBM Intelligent Investigation Manager by IBM

November 2012 - (Free Research)
Sit back for five minutes to watch this video and catch an inside look at a technology designed to protect your organization from fraud, which is more malicious and easier than ever across today's expansive IT and business operations. 
(VIDEO) READ ABSTRACT |

Finance Transformation - How SaaS Solutions Can Deliver Strategic Insights by Workday

February 2014 - (Free Research)
A recent study revealed many senior finance executives want to improve the quality of information available to management, but struggle with translating their business needs into technology solutions. Watch this video to learn how new technologies are giving finance a better, faster, and more complete picture of their business. 
(WEBCAST) READ ABSTRACT |

A Competitive Comparison of HP Thin Technologies by HP India

September 2012 - (Free Research)
Access this in-depth white paper to uncover the key features of HP's thin technology solution which make it a favorite among many organizations. 
(WHITE PAPER) READ ABSTRACT |

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months by MarkMonitor

October 2008 - (Free Research)
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month. 
(CASE STUDY) READ ABSTRACT |

Riding the Growth Wave: Leveraging Economies of Scale by SAP America, Inc.

April 2008 - (Free Research)
This paper examines how an integrated information technology solution can help you take advantage of economies of scale to boost manufacturing utilization, enhance service levels, and improve the efficiency of your sales and administrative activities. 
(WHITE PAPER) READ ABSTRACT |

Virtualize Critical Applications with IBM and VMware by VMware, Inc.

November 2011 - (Free Research)
When IT professionals migrate critical applications to a virtualized infrastructure, they must consider continuity throughout every stage in the application lifecycle. Access this white paper to learn about technology solutions that can virtualize your critical applications to enhance business value and minimize risks. 
(WHITE PAPER) READ ABSTRACT |

Aite Group analyst Paper: Investigation Management for Insurance: Catch Fraud More Efficiently by IBM

October 2013 - (Free Research)
View this resource to learn how to create an integrated fraud management program for your business. 
(WHITE PAPER) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com

August 2009 - (Free Research)
As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more. 
(EBOOK) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts