fraud detection

Results 1 - 25 of 69Sort Results By: Published Date | Title | Company Name
By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 2018 trends, aml trends, money laundering trends
     Fiserv
By: DellEMC and Intel®     Published Date: Sep 25, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Oct 18, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
     DellEMC and  Intel®
By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
     Dell and VMWare
By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
     Dell Server
By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
     Dell EMC & Intel
By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
     SAS
By: IBM     Published Date: Oct 26, 2016
Predictive analytics transforms organizations. Watch this video to see how predictive analytics can improve outcomes in four strategic areas critical to the success of your business: - Customer satisfaction and retention - More effective HR processes - Fraud and threat detection and prevention - Revenue growth and profitability
Tags : ibm, analytics, predictive analytics, enterprise applications
     IBM
By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
     TIBCO Software
By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting, cash reconciliation, cash transaction, fraudulent currency, counterfeit detection, counting errors, shrinkage, reconciliation
     Fiserv
By: SAS     Published Date: Jan 17, 2018
First, today’s digitally oriented customers expect banks to provide an ever-higher quality experience defined by speed and the flexibility to conduct business across many channels. They’ve grown accustomed to going online and transferring money between accounts, for example, and using their mobile device to make payments and check their account balance. These kinds of experiences have raised the bar in terms of customer expectations – and banks need to keep up, or risk losing customers. This is particularly true of millennial customers, as they have little regard for loyalty, which banks have traditionally relied on to build their business. Once frustrated by inconvenience, they don’t hesitate to switch banks – and thanks to the internet, this is now a fast, painless process.
Tags : 
     SAS
By: SAS     Published Date: Apr 25, 2017
For traditional banks, competing in an increasingly digital business environment is a challenge. And it’s getting tougher on several fronts. First, today’s digitally oriented customers expect banks to provide an ever-higher quality experience defined by speed and the flexibility to conduct business across many channels. They’ve grown accustomed to going online and transferring money between accounts, for example, and using their mobile device to make payments and check their account balance. These kinds of experiences have raised the bar in terms of customer expectations – and banks need to keep up, or risk losing customers. This is particularly true of millennial customers, as they have little regard for loyalty, which banks have traditionally relied on to build their business. Once frustrated by inconvenience, they don’t hesitate to switch banks – and thanks to the internet, this is now a fast, painless process.
Tags : 
     SAS
By: IBM     Published Date: Apr 27, 2017
It’s hard to grow your business if you can’t see what’s coming next. What will the demand be for a specific product or service and how should you adjust production? What revenue can be expected and from which channels? Where are the best areas to expand your business? Predictive analytics can provide the answers executives, analysts and business managers need to reduce costs, operate more efficiently and increase the bottom line. Join IBM SPSS and guest Mark Lack, Manager of Strategy Analytics and Business Intelligence with industrial products company Mueller Inc. for a look at how to decrease costs and improve your business’ profitability with predictive analytics. You’ll learn how Mueller extends the value of its Big Data environment by applying predictive techniques to accurately forecast sales, prevent fraud and reduce losses from damaged inventory, saving the company significant time and money.
Tags : predictive analytics, fraud detection, increase revenue, decrease costs, customer retention, hr efficiency, advanced analytics
     IBM
By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
     Datastax
By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk
     Iovation
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Datastax     Published Date: Dec 27, 2018
The world is moving at an increasingly accelerated pace. In this new Right-Now Economy, the rampant spread of payments fraud remains one of the biggest challenges for e-commerce and financial institutions. The worldwide e-commerce market was valued at $2.3 trillion for 2017, and 2018 should see even more growth, and along with it, more fraud. In the US alone, the cost of e-commerce fraud rose from $10 billion in 2014 to roughly $19 billion in 2018.
Tags : 
     Datastax
By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking, security
     Prodiance Corp.
By: Sift     Published Date: Jul 12, 2019
"As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach "
Tags : 
     Sift
By: TIBCO Software     Published Date: Mar 12, 2019
Fraud affects more than just your customers, it fundamentally destroys your reputation and has significant impact on your bottom line. In the first half of 2018, financial fraud from payment cards, cheques and remote banking totaled £358m in the UK alone, resulting from over a million incidents, an increase of more that 50% over the last 4 years. Have a look at this interesting Infographic to find out more.
Tags : fraud, fraud prevention, uk fraud, fraud detection, machine learning
     TIBCO Software
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com