truste

Results 101 - 125 of 293Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention
    
IBM
Published By: IBM     Published Date: Oct 01, 2014
Gaining a more complete, trusted view of customers is a strategic goal of most organizations. The challenge is that information about customers is typically managed and stored in many different applications, management systems and data silos. And this challenge is often compounded by a lack of consistency from one application to the next. The combination of IBM InfoSphere Data Explorer and IBM InfoSphere Master Data Management addresses these challenges by creating a single, combined, trusted 360-degree view of all data related to customers, accounts, products and other entities. The combined solution enables organizations to gain a deeper understanding of customer sentiment, increase customer loyalty and satisfaction, and get the right information to the right people to provide customers what they need to solve problems, cross-sell and up-sell.
Tags : 
data integration, customer loyalty, customer service, big data, data management
    
IBM
Published By: IBM     Published Date: Oct 01, 2014
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
mdm, big data, master data, data solutions, data management
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
big data, mdm, client analytics, real-time analysis, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
criminal fraud detection, authentication methods, ibm, criminal detection software, software development
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, cybercrime prevention, it security solutions, trusteer, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
Far from being out of date, mainframes are used around the world to build robust, trusted clouds. Increasingly, organizations are turning to cloud computing to improve their IT responsiveness and to reduce costs. And for enterprise workloads, which require highly reliable and secure platforms to meet demanding service levels, many companies are building their clouds using a mainframe.
Tags : 
ibm, cloud computing, cost reduction, next generation mainframe
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
IBM takes a broadly integrated approach to hardware, software and multi-vendor support that can help you find new ways to help simplify IT asset management, enhance quality and control costs.
Tags : 
technology infrastructure, virtualization, it business solutions, software service services, best practices, infrastructure management, technical support relationship, dynamic infrastructure
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
IBM
Published By: IBM     Published Date: Jun 19, 2014
Download this ebook to learn the requirements for delivering trusted information to a modern data warehouse.
Tags : 
ibm, big data, data warehousing, data, best practices
    
IBM
Published By: IBM     Published Date: Sep 15, 2014
Download this ebook to learn the requirements for delivering trusted information to a modern data warehouse and the guiding principles for trusted information in next generation data warehouse environments.
Tags : 
ibm, data warehouse, data warehousing, hadoop, trusted data, data
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, services provider, services provider selection, it organizations, it service providers, reduce cost, technology innovation, top ten criteria, it management, data management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal, software development
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control.
Tags : 
ibm, threat, trusteer apex, malware, application, networking, business technology
    
IBM
Published By: IBM     Published Date: Jan 13, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, data, infosphere, server, data warehousing, data management, business technology
    
IBM
Published By: IBM     Published Date: Jan 27, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior—and profitable—interactions with customers.
Tags : 
ibm, data, insights, results, analytics, cognitive commerce, knowledge management, data management, business technology
    
IBM
Published By: IBM     Published Date: Feb 22, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business.
Tags : 
ibm, data, mdm, big data, insight, infosphere, knowledge management, data management, business technology
    
IBM
Published By: IBM     Published Date: Feb 22, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization.
Tags : 
ibm, data, big data, hybrid, refined data, data refinery, data management, business technology
    
IBM
Published By: IBM     Published Date: Mar 21, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, fraud protection, fraud management fraud prevention, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, data management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.