HIT Consultant Insightful coverage of healthcare innovation
 

detect

Results 376 - 400 of 709Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Oct 24, 2011
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: SAS     Published Date: Aug 03, 2016
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
finance, tax fraud, security, protecting revenue, opportunities, analytics
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
For traditional banks, competing in an increasingly digital business environment is a challenge. And it’s getting tougher on several fronts. First, today’s digitally oriented customers expect banks to provide an ever-higher quality experience defined by speed and the flexibility to conduct business across many channels. They’ve grown accustomed to going online and transferring money between accounts, for example, and using their mobile device to make payments and check their account balance. These kinds of experiences have raised the bar in terms of customer expectations – and banks need to keep up, or risk losing customers. This is particularly true of millennial customers, as they have little regard for loyalty, which banks have traditionally relied on to build their business. Once frustrated by inconvenience, they don’t hesitate to switch banks – and thanks to the internet, this is now a fast, painless process.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
Health insurers have long been plagued by issues of fraud, waste, abuse, error and corruption. Taking an enterprise approach to payment integrity – one that combines advanced data management and sophisticated analytics – can help payers detect and prevent fraud; effect positive change in how providers, employees and patients behave; and substantially reduce health care costs. Payers can achieve better outcomes when software support for the core disciplines of payment integrity run on a single platform.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
Procurement fraud affects nearly one-third of organizations, and it is often perpetrated by the most trusted, longtime employees, the ones you’d least suspect. Learn from three white-collar crime specialists about common flavors of procurement fraud, striking examples from recent headlines, four fundamental ways to get better at detecting and preventing fraud, and how to take procurement integrity to the next level.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
How much are fraud, error, waste and abuse costing your organization? Costs to insurers are huge – as much as 25 percent of payments made. But data management and analytics can save the day. This paper discusses how data can be used to predict and detect loss in all its forms.
Tags : 
    
SAS
Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers
    
Lumension
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection, threat remediation, compliance
    
NetIQ
Published By: NetIQ     Published Date: Dec 08, 2011
In this webcast IT security expert Matt Mosley will look at traditional detection methods and discuss discuss new alternatives to identify threats.
Tags : 
    
NetIQ
Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Data Center Automation solution.
Tags : 
automation, launchpad, ibm, isms, ibm data center, data recovery, wireless internet, business intelligence, 802.11, wi-fi, authentication, vulnerability, san, nas, crm, erp, wireless security, wireless lan, communications software, converged networks
    
IBM Corporation
Published By: Zebra     Published Date: Jul 10, 2014
Detecting and preventing errors that threaten patient safety is a closed-loop process that begins at the point of care, extends to independent laboratories, and then back to the caregiver. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver, misidentification, information technology, practice management
    
Zebra
Published By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : 
tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi
    
IBM
Published By: IBM     Published Date: Aug 01, 2012
Read this white paper to learn how you can detect and prevent fraud and focus audits on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, ibm, tax adjustments, tax fraud, prevent fraud, detect fraud, technology
    
IBM
Published By: IBM     Published Date: Aug 07, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threat detection.
Tags : 
ibm, threat detection, technology, data management, security, it security
    
IBM
Published By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
data, mining, detect, insurance, fraud, insurers, fraudulent, claims, insurance, data, mining, techniques, audit, analytical, techniques, fraud, detection, cloud computing
    
IBM
Published By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : 
advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising, dsp, rtb, ad networks, ad exchanges, iab, banner ads, clickthrough, pixel, pixel tracking, mobile device detection, video advertising, interactive advertising
    
Mirror Image Internet
Published By: Intel     Published Date: Aug 10, 2012
An in-depth look at how McAfee Deep Defender and DeepSAFE work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization
    
Intel
Published By: Adobe     Published Date: Aug 02, 2017
With the advanced analytics capabilities in Adobe Analytics and the testing and targeting capacity of Adobe Target, it’s easier than ever to realise the potential of data-driven marketing. From creating a complete view of each customer across touchpoints and along their journey, to using predictive analytics, advanced anomaly detection and machine learning to understand behaviours and needs, you can use data to plan, create and optimise the experiences that matter to you and your customers.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
High performers are quick to detect and respond to subtle changes in their markets, absorb external pressures without undue disruption, and consistently achieve superior results. among these leading organizations is an increasing recognition of the value of using unified enterprise performance management solutions to measure, manage, and monitor their financial and nonfinancial performance.
Tags : 
sap, business, managing, finances, performance, performance management
    
SAP
Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW
Published By: McAfee     Published Date: Jan 28, 2014
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
av-test, deep defender, rootkits, detection
    
McAfee
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.