prevent fraud

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
Published By: SAP Concur     Published Date: Sep 25, 2019
"Regardless of your organizations industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. However, by establishing checks and balances to put you in control of employee spend, and making it easy for employees to comply with policies, you can mitigate, detect, and prevent losses due to accidental errors or fraudulent activities. Download this tipsheet to find out how you can cultivate compliance to better protect your business today."
Tags : 
    
SAP Concur
Published By: HERE Technologies     Published Date: Mar 13, 2019
In todays interconnected world you need to future-proof the integrity and reputation of your business. Your companys network remains the Achilles heel of the whole enterprise because once compromised, your companys reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your companys network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your companys network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
In todays interconnected world you need to future-proof the integrity and reputation of your business. Your companys network remains the Achilles heel of the whole enterprise because once compromised, your companys reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: SAS     Published Date: Jan 17, 2018
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
    
SAS
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. 2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing
    
Key Private Bank
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the devices security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless
    
Blue Coat Systems
Published By: Q2 eBanking     Published Date: Oct 24, 2017
Banks and credit unions can prevent fraudsters and other cybercriminals from gaining an upper hand on them by using more sophisticated protection. This protection is found in five layers of proactive security defense. Q2s paper, Multilayer Security Because a moat is not enough, discusses these essential layers to keeping account holders secure.
Tags : 
    
Q2 eBanking
Published By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyers Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
    
Riskified
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. Theyre not just preventing losses from chargebacks. Theyre gatekeepers to accepting more revenue. Its a complex job. But get it right, and they enable their business to engage customers better across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industrys needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that theres no silver bullet. So, in this paper, well look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
Published By: BAE Systems     Published Date: Dec 29, 2015
Learn about the challenges involved in combating first-party fraud and emerging best practices
Tags : 
bae systems, applied intelligence, fraud, first-party fraud, financial institution, network analytics, detection, prevention
    
BAE Systems
Published By: SAP     Published Date: Jul 18, 2016
People on the frontlines of public-sector fraud management have considerable need to detect, monitor and prevent fraud in real time. They recognize that speed in analysis, detection, investigations and simulations is the key to minimizing taxpayer dollars lost to fraud. Read the report to learn more.
Tags : 
    
SAP
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analysts Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence, security
    
IBM
Published By: IBM     Published Date: Oct 06, 2016
IBM i2 Analysts Notebook provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : 
cyber security, intelligence, prevention, ibm, data protection, network management, hacker detection, internet security
    
IBM
Published By: IBM     Published Date: Jan 26, 2017
This whitepaper talks about how organized criminals and lone fraudsters are continuously adapting to the ever-changing world we live in. Through IBM solutions for insurance fraud prevention, both enterprise and industry-wide financial institutions can prevent future fraud.
Tags : 
ibm, analytics, insurance fraud, insurance, organized crime
    
IBM
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.