AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023
|
|
|
The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023
|
|
|
Best Practices for Archiving Lotus Domino Environments
sponsored by Symantec Corporation
WEBCAST:
This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Posted: 07 Mar 2008 | Premiered: Mar 19, 2008, 14:00 EDT (18:00 GMT)
|
|
|
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006
|
|
|
Cascading Risk
sponsored by Core Security Technologies
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)
|
|
|
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER:
This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006
|
|
|
IBM Optim Data Privacy Solution for SAP
sponsored by IBM
PRODUCT LITERATURE:
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.
Posted: 29 Oct 2008 | Published: 29 Oct 2008
|
|
|
EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
sponsored by Qualys, Inc.
CASE STUDY:
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
Posted: 10 May 2008 | Published: 10 May 2008
|
|
|
eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by TechTarget Security
EBOOK:
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
Software Testing eZine Vol.2 - Testing Strategies for Complex Environments: Agile, SOA
sponsored by TechTarget Software Quality
EZINE:
In this issue of SearchSoftwareQuality.com's Software Testing eZine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology.
Posted: 06 May 2009 | Published: 06 May 2009
|
|