Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Are You Prepared for the True AD Disaster?
Have you ever experienced a major IT outage caused by issues with directory services such as Microsoft Active Directory? If not, you surely have heard about others that came into trouble here....
Learn more
Blog
Blog
Enhancing AI Cybersecurity: A Two-Fold Approach
Tune in to Sray Agarwal, Senior Director at Fractal AI discussing ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models.
Learn more
Executive View
Executive View
CYFIRMA DeCYFIR
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...
Learn more
Event Recording
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and...
Learn more
Security Offered as Components Empowering Enterprises to Gain Control
Event Recording
Security Offered as Components Empowering Enterprises to Gain Control
You often think service providers should build identity and API security infrastructure by themselves to have full control and flexibility so that it can fit into their business and technology...
Automated Serverless Security Testing: Delivering Secure Apps Continuously
Event Recording
Automated Serverless Security Testing: Delivering Secure Apps Continuously
Serverless technology eliminates the need for development teams to provision servers, and it also results in some security threats being passed to the cloud provider. This frees up developers to...
High-security & interoperable OAuth 2: What's the latest?
Event Recording
High-security & interoperable OAuth 2: What's the latest?
OAuth is a widely used authorization framework that enables third-party applications to access resources on behalf of a user. However, it has been historically difficult to meet very high security...
Why the Cyber Security Managed Service Market Needs a Twist?
Event Recording
Why the Cyber Security Managed Service Market Needs a Twist?
The Cyber Security Market has developed quite significantly within the last decade. The scarcity of expertise in the market, the increased number of attacks, the lack of leverage of product...
Orchestrating Zero Trust -
Event Recording
Orchestrating Zero Trust - "Detect, Decide, Direct"
The Zero Trust paradigm, the approach of eliminating inherent trust in an IT architecture and always verifying, has been discussed for over a decade. It is well known that Zero Trust is a team...
The Path to Passwordless is Paved with Orchestration
Event Recording
The Path to Passwordless is Paved with Orchestration
End-users have become accustomed to shopping, dining, traveling, learning, and caring for their health in an ever-more-digital fashion. Unfortunately, bad actors have put personal data at greater...
Optimize Security With Security Orchestration, Automation, & Response
Webinar Recording
Optimize Security With Security Orchestration, Automation, & Response
Join security experts from KuppingerCole Analysts and IBM as they explain how Security Orchestration, Automation, and Response (SOAR) solutions address this and other security challenges. They...
Maximizing Cyber Security Investments in Economically Turbulent Times
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look...
Fraud Reduction Intelligence  Platforms (FRIP)
Leadership Compass
Fraud Reduction Intelligence Platforms (FRIP)
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access...
Previous
4 5 6 7 8 9 10 Next