fraud

Results 276 - 300 of 350Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Feb 29, 2012
In a webcast co-hosted by the AMA and SAS, presenters described three areas of focus for using social media, and the five best practices for being effective in social media. This paper provides a summary of that webcast.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This collection is part of the ANA Magazine Thought Leadership Series sponsored by SAS. The articles explore the variety of ways to use analytics to create marketing functions that are more accountable and profitable.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This paper provides an intro to managers and marketing professionals applying analytics to marketing to significantly improve outcomes. It explains not only why you need to make this shift, but also how you get started and what tools you'll need.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
    
SAS
Published By: SAS     Published Date: Aug 13, 2018
You may know some data management basics, but are you aware of the transformational results that can result from doing data management right? This paper explains core data management capabilities, then describes how a solid data management foundation can help you get more out of your data. Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Unlike rules-based systems, which are fairly easy for fraudsters to test and circumvent, machine learning adapts to changing behaviors in a population through automated model building. With every iteration, the algorithms get smarter and more accurately find activities that represent risk to the firm.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining whats possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: Protect from reputational, regulatory and financial risks. Reduce the cost of fraud and financial crimes prevention. Gain a holistic view of risk across functions. Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: Cisco     Published Date: Sep 16, 2015
Increasingly, clues to what is happening with critical enterprise business processes will be found in data supplied by underlying infrastructure; indeed, the network can tell a story of how quickly and reliably customers are being served, operations are being run, or fraud or security threats are being repelled.
Tags : 
unified computing system, virtualization, networking, storage, enterprise resource planning, enterprise software
    
Cisco
Published By: IBM     Published Date: Aug 08, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
security, mobile risk mitigation, mobile baking, detect fraud, application security, hacker detection, identity management, intrusion detection, intrusion prevention
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection, intrusion prevention, security management
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
fraud prevention, malware detection, threat intelligence, cybercrime, technology, internet security, intrusion detection, intrusion prevention, security management
    
IBM
Published By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in todays environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : 
ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
    
IBM
Published By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : 
internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management
    
Symantec
Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management, data security, data center
    
Symantec
Published By: SPSS     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the technology sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making, international computing
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the marketing sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making
    
SPSS, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 12, 2011
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale.
Tags : 
verisign, extended validation ssl, verisign, papercheck.com, carinsurance.com, flagstarbank.com, creditkarma.comphishing, identity theft, fraud, ssl certificate, online retailers, insurance brokers, online pharmacy, financial services, travel, education, banking, verisign ev ssl certificates, www.verisign.c, access control
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: SAS     Published Date: Mar 31, 2016
Digitization creates major opportunities for financial services automating operations, expanding channels, delivering engaging customer experiences.
Tags : 
analytics, financial services, operations, digital management, data, best practices, business continuity, business analytics, project management
    
SAS
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.