{"id":9457,"date":"2022-05-03T10:00:00","date_gmt":"2022-05-03T16:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/fraud-case-management\/"},"modified":"2026-04-24T04:38:46","modified_gmt":"2026-04-24T10:38:46","slug":"gestao-de-casos-de-fraude","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/","title":{"rendered":"Gest\u00e3o de Casos de Fraude: O Que \u00c9, Como Funciona e Por Que Voc\u00ea Precisa Dela"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cyber threat investigation showing attacker activity analysis and digital forensics during incident response\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-05-03T10:00:00-06:00\">Mai 3, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Fraud Case Management: What It Is, How It Works, &#038; Why You Need It<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Fraud%20Case%20Management%3A%20What%20It%20Is%2C%20How%20It%20Works%2C%20%26%20Why%20You%20Need%20It').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ffraud-case-management%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Fraud%20Case%20Management%3A%20What%20It%20Is%2C%20How%20It%20Works%2C%20%26%20Why%20You%20Need%20It&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ffraud-case-management%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ffraud-case-management%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ffraud-case-management%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2>Equip your security operations team to triage threats beyond the SOC with Swimlane.<\/h2>\n<p dir=\"ltr\">As fraud becomes more complex\u2013 and unfortunately, more common \u2013 it\u2019s no longer enough for your cyber fraud task force to simply gather details about a single case. They must be able to look at overall patterns within their data to understand what\u2019s happening across your organization. Otherwise, the cost of fraud threats quickly adds up. In the past 12 months, $42 billion has been lost to fraud (<a href=\"https:\/\/www.pwc.com\/gx\/en\/services\/forensics\/economic-crime-survey.html\" target=\"_blank\" rel=\"noopener\">PwC<\/a>).<\/p>\n<p dir=\"ltr\">Fraud case management enables teams to scale their investigations by collecting all of their fraud details in one place\u2014making it easy to analyze, share insights, and track the status of each case.<\/p>\n<h3><strong>What is Fraud Case Management?<\/strong><\/h3>\n<p dir=\"ltr\">First, let&#8217;s start with a definition: fraud case management is a process that ensures investigations are conducted quickly, efficiently, and collaboratively. Fraud case management software refers to specially designed software that&#8217;s used to prevent, manage and investigate fraudulent activity. Because of the complexities surrounding fraud, it&#8217;s important for the different teams involved to stay on the same page during an investigation.<\/p>\n<p dir=\"ltr\">Fraud cases are often more complicated and costly than other types of investigations. They tend to involve more parties\u2014internal investigators, legal counsel, law enforcement officials\u2014and they can take place across a multitude of business tools and software. This makes organization and collaboration key to a successful outcome.<\/p>\n<p dir=\"ltr\">Fraud case management helps teams keep tabs on all the moving parts of an investigation. It allows users to securely collect and store data from various sources\u2014like emails, reports, and documents\u2014and share that information across departments. These features help fraud teams streamline their processes and reduce time spent on manual tasks like emailing multiple stakeholders or searching through hard drives for relevant evidence.<\/p>\n<p dir=\"ltr\">71% of companies expect to experience fraud in the next 12 months (<a href=\"https:\/\/assets.kpmg\/content\/dam\/kpmg\/xx\/pdf\/2022\/01\/fraud-survey.pdf\" target=\"_blank\" rel=\"noopener\">KPMG<\/a>). Thankfully, fraud case management software can benefit businesses of all sizes. One of its most significant perks is the ability to pull in information from various sources and analyze them together. For example, if a team member uncovers pertinent information from emails sent by an employee suspected of fraud, they can upload them into the case management system for documentation.<\/p>\n<h3>How Swimlane Fraud Case Management Works<\/h3>\n<p dir=\"ltr\">Low-code security automation solutions, like Swimlane, streamline the <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/fraud-investigation-and-response\">fraud investigation process<\/a> with automated data collection, monitoring, and reporting. This frees up security analysts\u2019 time so that they can strategically address complex, higher-level fraud. Specifically, Swimlane\u2019s fraud case management capabilities help your security operations team in three major ways:<\/p>\n<h4>Connects Disjointed Tech Stacks<\/h4>\n<p dir=\"ltr\">Swimlane automates the collection of fraud-related data across disparate security tools. Flexible architecture makes it easy for Swimlane to integrate with anything and automate any security workflow, even beyond the SOC.<\/p>\n<h4>A System of Record for Security<\/h4>\n<p dir=\"ltr\">As evidence is pulled across your tech stack, Swimlane organizes this data with its case management capabilities, becoming a system of record for security \u2013 both in and out of the SOC. Having easy to access evidence streamlines investigation and compliance efforts for your fraud and security teams.<\/p>\n<h4>Real-time Access to Cases<\/h4>\n<p>Swimlane\u2019s robust case management provides immediate access to fraud-related details so that your team can investigate and respond in real-time, reducing mean-time-to-resolve (MTTR). There\u2019s no need to wait for updates or lengthy data collection, your team can view activity and evidence immediately.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.youtube.com\/watch?v=d6lnT2b0QZc&amp;t=1s\" target=\"_blank\" rel=\"noopener\">Watch how Swimlane can automate incident response for fraud and credential leakage.<\/a><\/p>\n<figure><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/d6lnT2b0QZc\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/figure>\n<h3>How it Helps You<\/h3>\n<p dir=\"ltr\">Mundane, repetitive tasks take up too much time for SecOps teams. Swimlane\u2019s fraud case management automates these tasks so that investigators can spend more time investigating and less time performing admin functions. Fully-automated reporting across your security tools allows analysts to quickly identify potential fraud and triage threats before they grow.<\/p>\n<p dir=\"ltr\">Low-code security automation enables security teams to speed up investigation and response times. When your team is firing on all cylinders, <a href=\"https:\/\/swimlane.com\/blog\/soar-security-metrics\">security metrics<\/a> speak for themselves \u2013 faster MMTD and MTTR, improved dwell time, and higher preparedness levels all work to highlight the value of your organization\u2019s security investments.<\/p>\n<p dir=\"ltr\">Ready to empower your security team with fraud case management? <a href=\"https:\/\/swimlane.com\/demo\">Book a demo<\/a> to see Swimlane in action.<\/p>\n<\/p>\n<p dir=\"ltr\">\n\n\n\n<div class=\"bs-div bs-div-2ccf62b4ac4da1e0e18ad983e5e671f5b30bec3c bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-2ccf62b4ac4da1e0e18ad983e5e671f5b30bec3c {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-26-at-4.51.11\u202fPM.png' class='img-fluid'   alt='Technical dashboard preview displaying automated incident response metrics and real-time security telemetry.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-state-of-security-for-financial-services\">State of Security for Financial Services<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Download the full research report now to have increased visibility on the unique financial services threat landscape<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-7f504caf0206193bd1d5dc6ab54826a61fdc11f5\"><style>.bs-pro-button-p-btn-7f504caf0206193bd1d5dc6ab54826a61fdc11f5 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/state-of-cyber-security-for-financial-services\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download the Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69fb9f96bd515 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/automating-vulnerability-lifecycle-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mai 12, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management Automation: Here\u2019s Why You Need it<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69fb9f96bec06 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/what-is-cloud-security-automation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 26, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is Cloud Security Automation? Why You Need it<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69fb9f96c03ff bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/employee-onboarding-offboarding-automation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ago 12, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why You Need to Automate Your Onboarding &#038; Offboarding Process<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Equipe sua equipe de opera\u00e7\u00f5es de seguran\u00e7a para priorizar amea\u00e7as al\u00e9m do SOC com o Swimlane.<\/p>","protected":false},"author":5,"featured_media":9458,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,69],"class_list":["post-9457","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-use-cases"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fraud Case Management: What It Is &amp; Why You Need It<\/title>\n<meta name=\"description\" content=\"As fraud becomes more complex\u2013 and unfortunately, more common \u2013 it\u2019s no longer enough for your cyber fraud task force to simply gather details about a\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/gestao-de-casos-de-fraude\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud Case Management: What It Is, How It Works, &amp; Why You Need It\" \/>\n<meta property=\"og:description\" content=\"As fraud becomes more complex\u2013 and unfortunately, more common \u2013 it\u2019s no longer enough for your cyber fraud task force to simply gather details about a\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/gestao-de-casos-de-fraude\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T10:38:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gest\u00e3o de casos de fraude: o que \u00e9 e por que voc\u00ea precisa dela.","description":"\u00c0 medida que a fraude se torna mais complexa \u2013 e, infelizmente, mais comum \u2013 n\u00e3o basta mais que sua equipe de combate a crimes cibern\u00e9ticos simplesmente colete detalhes sobre um\u2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/gestao-de-casos-de-fraude\/","og_locale":"pt_PT","og_type":"article","og_title":"Fraud Case Management: What It Is, How It Works, & Why You Need It","og_description":"As fraud becomes more complex\u2013 and unfortunately, more common \u2013 it\u2019s no longer enough for your cyber fraud task force to simply gather details about a\u2026","og_url":"https:\/\/swimlane.com\/pt\/blogue\/gestao-de-casos-de-fraude\/","og_site_name":"AI Security Automation","article_modified_time":"2026-04-24T10:38:46+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/","url":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/","name":"Gest\u00e3o de casos de fraude: o que \u00e9 e por que voc\u00ea precisa dela.","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png","datePublished":"2022-05-03T16:00:00+00:00","dateModified":"2026-04-24T10:38:46+00:00","description":"\u00c0 medida que a fraude se torna mais complexa \u2013 e, infelizmente, mais comum \u2013 n\u00e3o basta mais que sua equipe de combate a crimes cibern\u00e9ticos simplesmente colete detalhes sobre um\u2026","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Fraud_case_mgt.png","width":1120,"height":679,"caption":"Cyber threat investigation showing attacker activity analysis and digital forensics during incident response"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/fraud-case-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Fraud Case Management: What It Is, How It Works, &#038; Why You Need It"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9457\/revisions"}],"predecessor-version":[{"id":55824,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9457\/revisions\/55824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/9458"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9457"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9457"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9457"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9457"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9457"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}