dcsimg
 
 

Base Technologies: Fraud Detection

By Baselinemag  |  Posted 2006-06-07 Email Print this article Print
 
 
 
 
 
 

Here are some of the technologies that are emerging in the effort to thwart procurement fraud.

As procurement fraud becomes more sophisticated, the tools to prevent and detect it are evolving as well. Here are some of the technologies that are emerging in the effort to thwart this form of criminal enterprise.

PRODUCT SUPPLIER WHAT IT DOES
Juniper Networks IDP Juniper Networks Helps protect networks against attacks; provides information on rogue servers and applications
Vontu 5.0 Vontu Offers prevention against insider theft
Reconnex iGuard Reconnex Provides visibility into all traffic entering or leaving corporate network
eTrust Network CA Uncovers network Forensics anomalies and (a.k.a. SilentRunner) breaches




 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit