Making a Business Case for Online Fraud Detection

Most organizations that enable users to perform Web transactions (e.g. banks and ecommerce sites) have implemented security controls to address online and mobile fraud. These controls fall into two buckets: transaction-focused intelligence, which looks for anomalous actions, and device-focused intelligence, which looks for a new device, a strange IP geo location, or signs that the device is infected with financial malware. Using these controls, organizations get to about 5-10% of high-risk scenarios that require a step-up authentication, such as secret questions and SMS one-time-passwords. Unfortunately, more than 20% of users fail step-up authentication.

Spotlight

TrustPipe, LLC.

TrustPipe was founded by a small group of Silicon Valley veterans with the mission of making the Internet safe, and armed with a profound breakthrough in security technology. The company's patented, marker-based approach is more accurate, more resilient in the face of constant change, and far less costly, and renders protect devices -- from datacenter switches to light switches -- virtually hack proof.

OTHER WHITEPAPERS
news image

2023 Data Protection Trends Executive Brief United States Edition

whitePaper | February 8, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 1175 in United States. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More
news image

The Economic Impact of Cyber Attacks

whitePaper | December 29, 2022

Businesses make up the core of an economy. And cyberattacks are among the topmost risks faced by any business organization irrespective of its size and domain of operation. Therefore, it is well established that cyber-attacks have a significant economic impact. Most of the attacks and breaches are financially motivated.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More

Spotlight

TrustPipe, LLC.

TrustPipe was founded by a small group of Silicon Valley veterans with the mission of making the Internet safe, and armed with a profound breakthrough in security technology. The company's patented, marker-based approach is more accurate, more resilient in the face of constant change, and far less costly, and renders protect devices -- from datacenter switches to light switches -- virtually hack proof.

Events