HIT Consultant Insightful coverage of healthcare innovation
 

detect fraud

Results 1 - 25 of 57Sort Results By: Published Date | Title | Company Name
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
    
CyberSource
Published By: AWS     Published Date: Jun 07, 2019
Watch this webinar to learn how Slalom helped Veripad enhance the accuracy of their machine learning models using AWS services. Together they helped health professionals detect fraudulent medications more accurately than the human eye.
Tags : 
    
AWS
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: WNS     Published Date: Apr 06, 2017
In the recent past, a New York City court convicted 13 people including six medical professionals who had, over several years, milked auto insurance companies of millions in fraudulent claims.
Tags : 
insurance, auto insurance, wns, benefits of wns
    
WNS
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: Teradata     Published Date: Jun 12, 2013
The ever-changing environment has offered fraudsters some tactical advantages to probe for holes in the defenses of financial services companies. Conventional approaches to fraud detection and remediation remain effective to a point, but conventional tools cannot effectively and economically process what is known as big data.
Tags : 
enterprise risk intelligence, fraud detection, big data, fraud prevention
    
Teradata
Published By: SAP     Published Date: Jul 18, 2016
People on the frontlines of public-sector fraud management have considerable need to detect, monitor and prevent fraud in real time. They recognize that speed in analysis, detection, investigations and simulations is the key to minimizing taxpayer dollars lost to fraud. Read the report to learn more.
Tags : 
    
SAP
Published By: IBM     Published Date: Apr 26, 2016
New channels and cashless payment ecosystems have created greater risk for financial institutions; the increase in fraudulent activities has compounded the need for more rapid detection and counter measures. Please view this webcast and learn: - The key challenges financial institutions face in rapidly detecting, responding and countering new fraud schemes - The value a cognitive computing approach offers an institution; enabling them to make swifter, more accurate decisions while providing more control and transparency
Tags : 
ibm, ibm banking industries, risk management, predictive analytics, fraud, cognitive computing
    
IBM
Published By: IBM     Published Date: Jan 26, 2017
The IBM Counter-Fraud Management for Insurance solution is designed to help insurers prevent and intercept attempted fraud while detecting, identifying, and building the case against past fraudulent activity and improper payments.
Tags : 
ibm, analytics, insurance, counter-fraud management, fraud
    
IBM
Published By: TIBCO Software     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
    
TIBCO Software
Published By: Intel Corp.     Published Date: Nov 21, 2017
this Whitepaper will provide an overview on personalizing customer experiences to pinpointing undetected fraud, to identifying business efficiencies, Intel's Saffron Natural Intelligence Platform helps financial institutions increase revenue and prevent loss.
Tags : 
    
Intel Corp.
Published By: TIBCO Software     Published Date: Mar 04, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 20, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
compliance, audit, fraud, data, detection, transactions, investigation, cost
    
TIBCO Software
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets
    
ArcSight
Published By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : 
monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat, data breach, productivity loss, employee fraud, chat recorder, loss prevention, employee investigation, computer surveillance
    
SpectorSoft
Published By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
    
Attachmate
Published By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
    
Attachmate
Published By: IBM     Published Date: Sep 25, 2013
Learn why an Enterprise Fraud Management Platform allows for data to be shared more efficiently while simultaneously applying analytics to prioritize workflows, which will increase productivity per employee and assist insurers in detecting emergent fraud patterns in order to reduce loses.
Tags : 
investigation management, investigation management team, fraud, enterprise fraud management platform, fraud management, data, analytics, fraud detection, reduce loss, employee productivity, workflow, fraud analytics
    
IBM
Published By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : 
vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
    
Vertica
Published By: IBM Software     Published Date: Nov 02, 2010
Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy, and saving time and resources.
Tags : 
ibm cognos predictive analysis, data mining, insurance fraud detection, analytical technique, prevention
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.