Fraud Prevention Reports

Client Case Study: Bouyges Telecom
sponsored by IBM
WHITE PAPER: In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

A Computer Weekly buyer’s guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
sponsored by IBM
WHITE PAPER: This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company