fraud prevention

Results 1 - 25 of 61Sort Results By: Published Date | Title | Company Name
By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 2018 trends, aml trends, money laundering trends
     Fiserv
By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing
     Key Private Bank
By: SAS     Published Date: Jul 14, 2015
An Enterprise Approach to Fraud Detection and Prevention in Government Programs.
Tags : fraud, detection, prevention, cost savings, efficiency
     SAS
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: IBM     Published Date: Oct 26, 2016
Predictive analytics transforms organizations. Watch this video to see how predictive analytics can improve outcomes in four strategic areas critical to the success of your business: - Customer satisfaction and retention - More effective HR processes - Fraud and threat detection and prevention - Revenue growth and profitability
Tags : ibm, analytics, predictive analytics
     IBM
By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf
     Fiserv
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
     DigitalPersona UK
By: Teradata     Published Date: Jun 12, 2013
The ever-changing environment has offered fraudsters some tactical advantages to probe for holes in the defenses of financial services companies. Conventional approaches to fraud detection and remediation remain effective to a point, but conventional tools cannot effectively and economically process what is known as big data.
Tags : enterprise risk intelligence, fraud detection, big data, fraud prevention
     Teradata
By: BAE Systems     Published Date: Dec 29, 2015
Learn about the challenges involved in combating first-party fraud and emerging best practices
Tags : bae systems, applied intelligence, fraud, first-party fraud, financial institution, network analytics, detection, prevention
     BAE Systems
By: SAP     Published Date: Jul 18, 2016
People on the frontlines of public-sector fraud management have considerable need to detect, monitor and prevent fraud in real time. They recognize that speed in analysis, detection, investigations and simulations is the key to minimizing taxpayer dollars lost to fraud. Read the report to learn more.
Tags : 
     SAP
By: IBM     Published Date: Jan 26, 2017
This whitepaper talks about how organized criminals and lone fraudsters are continuously adapting to the ever-changing world we live in. Through IBM solutions for insurance fraud prevention, both enterprise and industry-wide financial institutions can prevent future fraud.
Tags : ibm, analytics, insurance fraud, insurance, organized crime
     IBM
By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : email security, email fraud, whaling, mimecast, loss prevention
     Mimecast
By: Oath     Published Date: Nov 28, 2017
Video is evolving fast, and advertisers want high viewability with completion rates. See how you can deliver with ad fraud prevention, transparency, and the right programmatic partners. Scale your video inventory effectively to make the most revenue. Download now.
Tags : 
     Oath
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
     ArcSight
By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat
     SpectorSoft
By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : cisco, financial services, perception gaps
     Cisco
By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection
     Debix
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
     IBM
By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
     IDology
By: IBM Software     Published Date: Nov 02, 2010
Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy, and saving time and resources.
Tags : ibm cognos predictive analysis, data mining, insurance fraud detection, analytical technique, prevention
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : ibm, security, identity management, insurance fraud, data protection, risk management
     IBM Software
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com