fraud

Results 151 - 175 of 364Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 25, 2013
Learn why an Enterprise Fraud Management Platform allows for data to be shared more efficiently while simultaneously applying analytics to prioritize workflows, which will increase productivity per employee and assist insurers in detecting emergent fraud patterns in order to reduce loses.
Tags : 
investigation management, investigation management team, fraud, enterprise fraud management platform, fraud management, data, analytics, fraud detection, reduce loss, employee productivity, workflow, fraud analytics
    
IBM
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology Spotlight white paper
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Published By: HP     Published Date: Jan 20, 2015
Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability
    
FICO
Published By: Concur Technologies     Published Date: Oct 09, 2015
Millions in losses, millions more in fines. Yet research shows 82% of travel and entertainment fraud is committed by just 5% of employees. This eBook explains what’s at stake and how automating expense reports can uncover fraud or head it off before it happens, and help employees make the right choices.
Tags : 
t&e, concur, compliance, financial services, fraud
    
Concur Technologies
Published By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : 
social, engineering, fraud, cyber, security, scams
    
FICO
Published By: Mitto     Published Date: Jun 09, 2017
A2P (Application to Person) messaging has underpinned this transformation, across a wealth of new use cases and new verticals. Historically, A2P was used for alerts and, as PSMS (Premium SMS), as a billing mechanism and carrier for simple content and services, both for one-off downloads or actions (eg voting) and for recurring payments. The latter use case has declined markedly in the past 5 years, due largely to the transition to an app-based economy, largely driven by card billing and by regulatory action (in markets such as the US and UK) against fraudsters.
Tags : 
    
Mitto
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : 
database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection, hack, hacking, debix
    
Debix
Published By: SAS     Published Date: Apr 14, 2016
Changement des pratiques de détection et de prévention des fraudes dans les banques et les services financiers
Tags : 
    
SAS
Published By: Oracle     Published Date: Oct 22, 2015
As many retailers know, fraud can be disguised by training issues and vice versa. So how do you determine fraud versus training issues and take institutional or tribal knowledge and build meaningful reports for end users? This e-book from Oracle Retail discusses the use case for expection-based reporting with specific examples and recommendations.
Tags : 
oracle retail, oracle, loss prevention, actionable insight, protecting profits
    
Oracle
Published By: LifeLock     Published Date: Jan 17, 2018
In the spring of 2015, 4 employees from the company’s primary manufacturing plant discovered that fraudulent tax returns had been filed using their names, addresses and social security numbers. These were random incidents and not the result of a company data breach. After repeated attempts involving many hours trying to personally remediate the problem, the employees turned to the head of HR for aid in resolving the situation.
Tags : 
    
LifeLock
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Published By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, data leakage protection, dlp, smart security, data-stealing
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : 
vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
    
Vertica
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft, credit cards, payment card, consumer protection, information management, regulations, regulatory compliance, netforensics, security
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
    
netForensics
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology
    
IDology
Published By: IBM Software     Published Date: Nov 02, 2010
Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy, and saving time and resources.
Tags : 
ibm cognos predictive analysis, data mining, insurance fraud detection, analytical technique, prevention
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management
    
IBM Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee