Base Technologies: Fraud Detection

As procurement fraud becomes more sophisticated, the tools to prevent and detect it are evolving as well. Here are some of the technologies that are emerging in the effort to thwart this form of criminal enterprise.

PRODUCTSUPPLIERWHAT IT DOES
Juniper Networks IDPJuniper NetworksHelps protect networks against attacks; provides information on rogue servers and applications
Vontu 5.0VontuOffers prevention against insider theft
Reconnex iGuard ReconnexProvides visibility into all traffic entering or leaving corporate network
eTrust NetworkCAUncovers networkForensics anomalies and(a.k.a. SilentRunner) breaches