Home
 > search for

Featured Documents related to »  fraud analysts

SAP to Bring Predictive Analytics to the Masses
Traditionally, SAP has not been a leader in predictive analytics, at least not until its acquisition of Business Objects and the advent of SAP HANA. SAP has

fraud analysts  HANA, including the SAP Fraud Management analytic application, SAP Smart Meter Analytics software, and the SAP 360 Customer solution. The software also enables accelerated predictive analytics, expanded data scope, and improved model scoring by leveraging the embedded predictive analysis library in SAP HANA. Additionally, the interoperability of the R statistics programming language with SAP HANA opens up all the statistical functions available in one of the world’s most popular open source projects. Read More...
Recruitment and Staffing
Recruitment and Staffing functionality allows the user to select and hire the right people with the right skill sets, as well as track the information regarding their recruitment for later analysis...
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » fraud analysts


Eccentex-Enabling Do-it-yourself Case Management
Various types of vendors and products have taken hold of the business process management (BPM) software market. While there are mainstream BPM providers such as

fraud analysts  can employ to catch fraud, remove duplicate data, derive best practices, etc. AppBase can also integrate with predictive analytics solutions for extensive use in its case management systems. Eccentex CEO Tells More To expand on Eccentex’ value proposition and go-to-market strategy, we recently spoke to the company’s chief executive officer (CEO) Glen E. Schrank. Mr. Schrank was most recently president and CEO of HireRight, a background screening software-as-a-service (SaaS) company. As a member of Read More...
Can Technology Make CFO's and Controller's Jobs More Strategic? (Part 2)
Part 1 of this blog series established that by offloading non-essential and non-value-adding routine tasks to third-party business process outsourcing (BPO

fraud analysts  but impossible to perpetrate fraud when one is combining this breadth of vetted best practice frameworks. In other words, who and where could hide any rogue transaction in a unified platform with visibility? There is no place to hide, as mistakes would be immediately discovered via pre-built compliance processes and sign-offs. Since Corefino has spent several years writing the abovementioned custom best practices and workflows layer (i.e. 500 embedded processes, alerts, quality checks, etc.), the third Read More...
SAS: Striving to Sustain Leadership
SAS Institute has been successful, moving beyond a business intelligence. Lately, it has lately focused on sustaining its technology leadership, expanding in

fraud analysts  and statistical visualization to fraud detection and DW administration tools. Products include CRM, financial intelligence, human capital management (HCM), IT management, patent intelligence, performance management, process intelligence, risk management, scorecarding, supplier relationship management (SRM), supply chain intelligence, value chain analysis, warranty analysis, and Web analytics. SAS also provides services like consulting, technical support, and training and it has a number of subsidiaries, Read More...
Can You Trust Entrust?
An information security company whose middle name is 'Trust' is accused of misrepresentation of revenue projections.

fraud analysts  You Trust Entrust? Can You Trust Entrust? L. Taylor - August 1, 2000 Event Summary Entrust Technologies, Inc., headquartered in Plano, Texas with offices in Canada, the United Kingdom, Japan, Switzerland, and Germany is the subject of a class action lawsuit filed by Kirby McInerney & Squire, LLP representing all purchasers of Entrust securities between April 19, 2000 and July 3, 2000. Ironically, Entrust is an information security vendor that specializes in the kinds of products other businesses use to Read More...
The Newest Release of SYSPRO ERP-SYSPRO 7-Is Now TEC certified
It has been only a year and a few months since Technology Evaluation Centers (TEC) analysts last certified the then-current version of SYSPRO ERP, SYSPRO 6.1

fraud analysts  Newest Release of SYSPRO ERP-SYSPRO 7-Is Now TEC certified It has been only a year and a few months since Technology Evaluation Centers (TEC) analysts last certified the then-current version of SYSPRO ERP, SYSPRO 6.1, and I am glad to tell you that SYSPRO’s newest release, SYSPRO 7, is now certified. Similarly to the in-depth 2012 SYSPRO 6.1 certification process, SYSPRO 7 is now certified in multiple TEC enterprise resource planning (ERP) software models: ERP for discrete manufacturing, ERP for Read More...
Eccentex Lets Business Analysts Assemble and Manage Their Own Cases
Eccentex Corporation provides dynamic case management (DCM), a.k.a. adaptive case management, software-as-a-service (SaaS) solutions using its multitenant cloud

fraud analysts  Lets Business Analysts Assemble and Manage Their Own Cases Eccentex Corporation provides dynamic case management (DCM), a.k.a. adaptive case management, software-as-a-service (SaaS) solutions using its multitenant cloud-based AppBase platform as a service (PaaS). DCM solutions should support what the evolving knowledge worker needs  and allow organizations to optimize case outcomes, improve customer services, and mitigate risk. Eccentex recently announced the launch of AppBase 5.0 , which Read More...
Integrating Vulnerability Assessment and Remediation: Guidelines to Maximize Performance and Benefits
Over the past few years, vulnerabilities have exploded across all types of platforms—leaving IT security and operations teams scratching their heads. Today

fraud analysts  Vulnerability Assessment and Remediation: Guidelines to Maximize Performance and Benefits Integrating Vulnerability Assessment and Remediation: Guidelines to Maximize Performance and Benefits If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. With the perpetual onslaught of new vulnerabilities , including zero-day threats, implementing a cost-effective, positive security approach to unified protection and control is a critical Read More...
Technology Vendor--Can You Afford Credibility?
For Technology vendors, credibility is the ability to sell. Credibility is vital, is hard to build, and easy to lose. Building credibility doesn't have to be

fraud analysts  Vendor--Can You Afford Credibility? Introduction Webster defines credibility as the ability to be believed. Technology vendors need to define credibility as the ability to sell. Research by The Credibility Forum ( www.thecredibilityforum.com ) shows that technology vendors are weak in understanding the impact credibility has on their efforts, knowing how to gauge their own credibility, and utilizing methods to build and maintain credibility. Defining credibility as the ability to sell means Read More...
Diagnosing Requirements Failure: A Benchmark Report
According to an IAG survey, 70 percent of companies lack the fundamental competencies within business requirements discovery to consistently bring in projects

fraud analysts  Requirements Failure: A Benchmark Report Diagnosing Requirements Failure: A Benchmark Report If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. On our engagements, IAG consultants use a consistent approach to requirements definition and management that is a key reason for our achieving superior work products and successful project and business outcomes for our clients. The bottom line is faster results with higher quality and a Read More...
StarGarden SGHR Human Resources Certification Report
StarGarden SGHR by StarGarden Software is now TEC Certified for online evaluation of human resources (HR) solutions in the Human Capital Management (HCM

fraud analysts  SGHR Human Resources Certification Report StarGarden SGHR by StarGarden Software is now TEC Certified for online evaluation of human resources (HR) solutions in the Human Capital Management (HCM) Evaluation Center. Certification ensures that StarGarden Software has demonstrated StarGarden SGHR's support for specific real-world business processes chosen by TEC analysts, and that TEC analysts have analytically and comparatively reviewed research questionnaire data about StarGarden SGHR against Read More...
Compaq Plans Direct Sales. DTja vu All Over Again?
Compaq Computer told financial analysts it plans to start selling more of its computers directly to customers, and this time the company says it means it.

fraud analysts  Plans Direct Sales. DTja vu All Over Again? Event Summary Speaking to financial analysts in Houston, Compaq Computer stated it plans to start selling more of its computers directly to customers, and this time the company says it means it. Compaq executives predicted that approximately 60 percent of its PCs for the commercial market in North America will be sold directly to customers - rather than through distributors or dealers - by the end of the year. Currently, 85 percent of its PCs go through Read More...
ATM Machines Hacked in Moscow
Recently Moscow's ATMs have fallen victim to cyberfraud. How does ATM hacking take place? Has it happened in the United States? What can you do to safeguard

fraud analysts  Several years ago, ATM fraud occurred at a bank in New York in which a disgruntled ex-employee stole over $80,000. After shoulder surfing for customer PINs, he used discarded bank receipts to associate the PIN with an account number, and was able to later enter these numbers into the ATM, and use his own PIN to withdraw money. Presumably he did this by using a magnetic striper writer. Some bank ATMs can be hacked by observing a person's PIN number, then inserting a phone card. The ATM machine believes Read More...
Analyst / SCT Share Vision at SCT User Conference
The SCT User Conference featured industry analysts from Gartner Group, AMR Research and Meta Group each sharing its vision for the future of enterprise systems

fraud analysts  / SCT Share Vision at SCT User Conference Analyst / SCT Share Vision at SCT User Conference P. Catz - May 21, 2001 Event Summary The SCT User Conference, held in Toronto featured industry analysts from Gartner Group , AMR Research and Meta Group each sharing their vision for the future of enterprise systems with the audience. Customers, in special interest groups and in presentations discussed their success with SCT's products. SCT showed both their existing product set plus their vision for the Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others