Guides Fraud AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guides Fraud And returned the following results.
RSS What is RSS?
Related Categories

 •   Fraud Detection & Prevention
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Statistical Data Analysis
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Access Guides
 •   Construction Guides
 •   Costing Guides Fraud And
 •   Guides Databases
 •   Guides Fraud And Businesses
 •   Guides Fraud And Demo
 •   Guides Fraud And Environment
 •   Guides Fraud And Schemas
 •   Guides Fraud Price
 •   Publishing Guides
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive by IBM

July 28, 2011 - (Free Research)
This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action. 
(WHITE PAPER) READ ABSTRACT |

HPArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction by Hewlett-Packard Company

July 31, 2013 - (Free Research)
In this case study, learn how one bank implemented a fraud management security platform that was able to meet the growing scale of customers, while providing clear visibility into transaction activity over a range of channels. Click now to see how else they're benefiting! 
(WHITE PAPER) READ ABSTRACT |

Finansbank Combats Fraud and Increases Customer Satisfaction with HPArcSight ESM by Hewlett-Packard Company

December 31, 2013 - (Free Research)
In this case study, learn how one bank implemented a fraud management security platform that was able to meet the growing scale of customers, while providing clear visibility into transaction activity over a range of channels. Click now to see how else they're benefiting. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Avoid Overlooking the Growing Fraud Threat When Planning AP Automation by SAP America, Inc.

December 2009 - (Free Research)
This paper discusses how automated AP can help reduce a great portion of frauds and schemes with less human "touch points" involved in invoice processing which translates to less chances for dishonest employees to falsify invoice data or otherwise manipulate the AP process for personal gain. 
(WHITE PAPER) READ ABSTRACT |

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance by Oracle Corporation

May 2011 - (Free Research)
Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Red Flag Rules Compliance by Gemalto

September 2010 - (Free Research)
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims. 
(EBOOK) READ ABSTRACT |

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards by Zebra Technologies

March 2011 - (Free Research)
Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies. 
(WHITE PAPER) READ ABSTRACT |

Global profiles of the fraudster by ComputerWeekly.com

November 2013 - (Free Research)
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com

August 2009 - (Free Research)
As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more. 
(EBOOK) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle by Guardium, an IBM Company

February 2010 - (Free Research)
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle. 
(DATA SHEET) READ ABSTRACT |

Using Data Mining to Detect Insurance Fraud by IBM

November 2010 - (Free Research)
Insurers lose millions each year through fraudulent claims. This paper explains how leading insurance companies are using data mining techniques to find fraudulent claims. Read on to learn how to combine powerful analytics with your existing fraud detection and prevention efforts. 
(WHITE PAPER) READ ABSTRACT |

Five Common Web Application Vulnerabilities and How to Avoid Them by Imperva

March 2014 - (Free Research)
In this E-Guide, expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises fix the original problems. 
(EGUIDE) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

How retailers can manage customer data collection to decrease fraud by SonicWALL

March 2011 - (Free Research)
This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities. 
(EGUIDE) READ ABSTRACT |

Client Case Study: MoneyGram International by IBM

August 2011 - (Free Research)
This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud. 
(WHITE PAPER) READ ABSTRACT |

Webinar: IBM IIM for Fraud, Abuse and Waste in Government by IBM

April 2014 - (Free Research)
Tune into the following webinar to explore the challenges and opportunities within the current state of fraud reduction, waste, and abuse in government programs and agencies. Also gain access to technology recommendations and more. 
(WEBCAST) READ ABSTRACT |

10 Reasons Large CompaniesUse Automated Travel andExpense Management Solutions by Concur Technologies (E-mail this company)

September 2013 - (Free Research)
This resources gives the most frequent reasons organizations adopt an automated travel and expense management solution. These reasons included improved security, compliance, and reduced costs. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

March 2007 - (Free Research)
This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years. 
(WHITE PAPER) READ ABSTRACT |

Align policy, processes and people for efficient tax and finance operations by IBM

October 2011 - (Free Research)
Learn how to leverage advanced case management to apply analytics to detect fraud and support investigations. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Strategic guide to insider threat detection and breach response by Imperva

March 2011 - (Free Research)
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts