fraud

Results 251 - 275 of 370Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless, storage, business technology, data center
    
Blue Coat Systems
Published By: Teradata     Published Date: Jun 12, 2013
The ever-changing environment has offered fraudsters some tactical advantages to probe for holes in the defenses of financial services companies. Conventional approaches to fraud detection and remediation remain effective to a point, but conventional tools cannot effectively and economically process what is known as big data.
Tags : 
enterprise risk intelligence, fraud detection, big data, fraud prevention
    
Teradata
Published By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
    
Attachmate
Published By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit, security, storage, data management, business technology
    
Attachmate
Published By: Concur     Published Date: Feb 04, 2013
Expense fraud costs a median loss of $33,000 in each instance, according to Association of Certified Fraud Examiners (ACFE). Despite the nonchalant attitude of many employees, expense fraud is a crime that affects organizations large and small.
Tags : 
fraud, expense fraud, corporate expense policy, preventing fraud, identifying fraud
    
Concur
Published By: SpectorSoft     Published Date: Jan 14, 2013
There are mediums you allow everyday access to that can be used to raise productivity and meet business objectives, but can just as easily be used to take data out of the business.
Tags : 
spectorsoft data security, threats, stealing data, fraud, business technology
    
SpectorSoft
Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management, data security, business technology, data center
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : 
internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management, business technology
    
Symantec
Published By: IBM     Published Date: Dec 17, 2012
This seminar will show you how next-generation solutions are solving the "big data" challenge, and are providing enterprises with the visibility and analysis they need to move from post-incident forensics to pro-active and fraud intelligence.
Tags : 
ibm, big data, government, data management, visibility, business intelligence, it management, business technology
    
IBM
Published By: Concur     Published Date: Dec 06, 2012
A straightforward guide that covers what expenses fraud is, what it costs the UK, whether you should be concerned, and what you can do about it.
Tags : 
expenses, fraud, criminal, intentional
    
Concur
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security, business technology
    
Symantec.cloud
Published By: Symantec     Published Date: Oct 02, 2012
Internet Trust Marks: Building Confidence and Profit Online
Tags : 
trust marks, online shopping, profit, fraud, phising, norton cybercrime report, business technology
    
Symantec
Published By: Neustar     Published Date: Aug 20, 2012
Learn how a DollarFinancial leverages real-time verification tools to reduce fraud, bad debt and default loans - all from the application process.
Tags : 
risk management, online verification, risk verification, consumer validation, consumer verification, reduce fraud, reduce bad debt, reduce default loans, verify leads
    
Neustar
Published By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
data, mining, detect, insurance, fraud, insurers, fraudulent, claims, insurance, data, mining, techniques, audit, analytical, techniques, fraud, detection, it management, data management, data center
    
IBM
Published By: IBM     Published Date: Aug 01, 2012
Read this white paper to learn how you can detect and prevent fraud and focus audits on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, ibm, tax adjustments, tax fraud, prevent fraud, detect fraud, technology
    
IBM
Published By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : 
tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi
    
IBM
Published By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, business, healthcare, taxes, government, ibm, spss
    
IBM
Published By: UL EduNeering     Published Date: Jul 05, 2012
Good Manufacturing Practices (GMP) violations have become the new healthcare fraud as the Department of Justice (DOJ) tests out new legal theories under the False Claims Act (FCA). The Food and Drug Administration (FDA) has dusted off its regulatory authority to prosecute GMP violations.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11, regulatory compliance, pharmaceuticals, medical device, good manufacturing practices, quality system regulation, online compliance training, part 11 compliance, fda part 11 compliance, iso 13485, quality management system, life science, health care
    
UL EduNeering
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud
    
LifeLock
Published By: SAS     Published Date: Mar 20, 2012
The banking sector routinely manages massive amounts of data, ranging from financial transactions to customer, operational and regulatory data. All this data means big challenges - but also big opportunities - for the industry. Find out more now!
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Mar 01, 2012
This paper defines predictive analytics, then details ways this type of analytics can be applied to marketing, risk, operations and more. It also includes information relevant to a wide variety of industries - from manufacturing to hospitals.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Mar 01, 2012
This paper shows the results of the survey, as well as trends and expert opinions focusing on why some top organizations are able to successfully extract insight from "big data."
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee