Presentations

Filter resources by selecting one or more types, categories, topics, and/or years:
  • Remove Filters

Exploring Local Payment Methods in a Global Marketplace

PPRO provides payment preference insights for nine growing eCommerce markets in three key regions.

Read more »

Compromised Credentials: Tackling a Perpetual Weak Link

Enzoic examines why compromised credentials continue to be a significant attack vector and what actions companies can take to better protect themselves and their customers.

Read more »

Building Your Asset: Developing Your Payments Engine Architecture

RPGC delves into why merchants would benefit from the concept of payments orchestration and shares factors merchants should consider when evaluating payments engines to help grow their businesses.

Read more »

VMPI -- Just the Facts with Real Results

FraudPVP provides a primer on Visa Merchant Purchase Inquiry and details how merchants using it can substantially reduce their chargebacks.

Read more »

Gig and Sharing Economy Merchants: Success When Expanding Into LATAM

dLocal details the payment dilemas sharing economy merchants tend to find when expanding to Latin America and what steps they can take to not simply adapt, but thrive.

Read more »

Learn How Risky or Trustworthy a Transaction Is with the Perseuss Reputation Score

Perseuss provides an overview of their risk mitigation platform, which uses data from merchants around the globe and a range of verticals.

Read more »

Exploring Fraud Mitigation and Payment Technologies Through the Paladin Vendor Report

Paladin delves into the purpose and process behind the latest version of their detailed, platform agnostic report on available fraud mitigation technologies.

Read more »

Is It Dead Yet? Why ATO Is so Difficult to Kill and What to Do about It

Three industry veterans outline their perspectives and practical steps merchants can use to tackle account takeovers, one of the most common types of fraud affecting online retailers today.

Read more »

Digital Identity: Fighting Fraud with Next Generation Device-to-Identity Signals

Neustar looks at how companies can use device-based identity linkages to identify good customers and provide them the straightforward experience they expect while also minimizing overall risk exposure.

Read more »

Using Compromised Credential Detection to Prevent Account Takeover and Fraud

Enzoic explains why account takeovers are a pervasive problem for online businesses across industries and what companies can do to protect their customers while still providing a user-friendly shopping experience.

Read more »