fraud

Results 201 - 225 of 339Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transactions lifecyclepre-login, during login and post-loginand offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security, authentication, firewalls, hacker detection, security management, security policies, vulnerability management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of todays fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft, anti spyware, hacker detection, identity management, internet security, security management, single sign on, web service security, vulnerability management
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
best practices, business intelligence, ibm, finance, automated protection, business management
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In todays virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce, business management
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraudall while helping to lower costs and improve the customer experience.
Tags : 
security, best practices, fraud management, financial organizations, business management, ibm, business intelligence
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud, prevention, protection, threat, security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection, security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
In todays virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad.
Tags : 
ibm, malware, industry, cybercrime, fraud, security
    
IBM
Published By: IBM     Published Date: Mar 21, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraudall while helping to lower costs and improve the customer experience.
Tags : 
security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud loss reduction, fraud management, fraud prevention, security, knowledge management, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, knowledge management, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraudall while helping to lower costs and improve the customer experience.
Tags : 
ibm, fraud protection, fraud management fraud prevention, security, knowledge management, enterprise applications, network security
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, Take me to work, and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. Its also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. Whats new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Industry leaders from the banking and vendor landscape are working to streamline the customer experience while closing the opportunities for fraud and exposure. Balancing security and convenience will require an approach that combines consumer-facing authentication (such as passwords, PINs and biometrics) with background security measures (such as transaction and session-behavior analytics).
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS unique, hybrid approach to insider threat deterrence which combines traditional detection methods and investigative methodologies with behavioral analysis enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
If we had done anything differently in Washington state, we would have done it faster, said Hammersburg. The key message is that fraud prevention dealing with risk and program integrity is not a cost issue, its a saving. When you can truly quantify the positive impact to the bottom line of a company or government agency, you shift the recognition that this is not an expense but that its a saving. Some government organizations may be concerned that a rigorous program to shine a light on the underground economy will shine a brighter light on how much they didnt know until now. Dont let that stop you, said Hammersburg. You have the opportunity to really get ahead of it now. Turn a risk into an opportunity going forward.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Traditional procurement fraud detection methods manual searches; spreadsheets; and simple slice, dice, filtering and reporting from silo systems are not keeping pace. Whatever tools and processes are in place now, theres always the opportunity to evolve to a higher level for more accurate detection more high-value alerts and fewer false positives.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Tags : 
verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft, fraud, authentication, encryption, hacker detection, identity management, internet security, security policies, ssl
    
VeriSign, Inc.
Published By: Click Forensics     Published Date: Aug 13, 2008
In this webinar presentation given by Andy Sweet, Owner, New Tune Media, and Matt Graham, Risk Analyst, Click Forensics, learn practical tips on ways to proactively reduce exposure to click fraud and poor quality traffic in search marketing campaigns.  Also includes a real advertiser’s perspective on driving better traffic quality.  Listen now!
Tags : 
click forensics
    
Click Forensics
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation, application security, auditing, internet security, security management, web service security
    
Iovation
Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, identity theft, global fraud database, forensic analysis, credit card industry, application security, identity management, internet security, security management, web service security
    
Iovation
Published By: Iovation     Published Date: Sep 25, 2009
This white paper will help you understand what new and innovative techniques can be used to protect the reputation of your business and keep your members in a safe and trusted environment, while keeping the fraudsters out.
Tags : 
online dating, online community fraud and abuse, low false positives, pattern matching, web device print, download device print, pattern matching and risk assessment, forensic analysis, application security, authentication, identity management, internet security, network security appliance, security management, web service security
    
Iovation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.