• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

credit

Results 151 - 175 of 243Sort Results By: Published Date | Title | Company Name
By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, consumer data, data protection, customer data, tripwire, security, authentication, compliance, internet security, security management, security policies
    
Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire, pci compliance
    
Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing, business process automation, data protection, pci compliance
    
Tripwire
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability, it management
    
IBM
By: IBM     Published Date: Jul 31, 2014
Territory management and crediting are an integral part of every sales compensation program. Download this paper to understand how you can get clarity, transparency and consistency around territory management and sales crediting.
Tags : 
ibm, territory management, crediting, sales compensation, sales compensation program, sales crediting, incentive compensation management, sales process, sales crediting roles
    
IBM
By: Business.com     Published Date: Oct 09, 2012
Paying with credit cards will help increase the consumer's want to buy and help increase the company's sales; however accepting credit cards isn't quite as easy as it seems.
Tags : 
credit cards, credit, processing, business, fees
    
Business.com
By: Business.com     Published Date: Oct 09, 2012
If you're in business these days, you need to accept credit cards. The problem is, which type of credit card processing should you choose?
Tags : 
credit card processing, credit card fees, credit card, merchant account
    
Business.com
By: Business.com     Published Date: Oct 09, 2012
Credit cards are an integral part of modern business. Even customers who don't use credit will want to use debit or gift cards based around similar technology.
Tags : 
credit card, processing, credit card terminal, business technology, electronics
    
Business.com
By: Neolane, Inc.     Published Date: Jul 13, 2010
Mornay Services, a subsidiary of the Groupe Mornay retirement fund, offers individual accident and health insurance as well as savings and credit products. Operating a direct sales model, Mornay Services boasts a portfolio of 200,000 repeat customers and a database of one million potential customers.
Tags : 
neolane, mornay, avatars, cross channel, marketing, groupe mornay, credit, savings, strategy
    
Neolane, Inc.
By: IBM     Published Date: Feb 09, 2015
This webinar was presented by Carla Wolfe on the key tips of process, technology, and people. Learn how Blue Works came to grow with the industry and as a process business itself.
Tags : 
ibm, blueworks, blueworks live, transform performances, process management, it management, knowledge management, enterprise applications
    
IBM
By: IBM     Published Date: Feb 04, 2016
Carla Wolffe, senior business analyst at Elevations Credit Union, discusses how Elevations Credit Union has transformed their organizational performance, reducing the average time to fund a home equity loan by 61% and increasing the number of loans each underwriter handles by 71%. By modelling, analyzing, and improving their existing processes, Elevation has been able to drive out their inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool at the heart of this transformation. Come find out more on how IBM Blueworks Live can help your business.
Tags : 
ibm, blueworks, live, analytics, data, organization, efficiency, inefficiencies, business intelligence
    
IBM
By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
ibm, security, web fraud, malware, cybercrime, cyber security, knowledge management, enterprise applications
    
IBM
By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement
    
Zycus
By: SAS     Published Date: Nov 16, 2018
More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Tags : 
    
SAS
By: Esker     Published Date: Jan 08, 2019
Your project isn’t the only one vying for approval and budget dollars in the organization. In order to create a clear and comprehensive business case for AR automation, AR and credit managers need to show how its benefits translate beyond just AR to the business as a whole. In this 14-page white paper, you’ll learn how and what to communicate to various key stakeholders, including: • C-suite / upper management • AR clerks and other team members • Sales staff
Tags : 
    
Esker
By: Dell     Published Date: Jan 21, 2015
Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.
Tags : 
dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery, wireless security, server virtualization, data warehousing, email archiving, data center design and management
    
Dell
By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
By: IBM     Published Date: Mar 31, 2016
"Colorado-based, Elevations Credit Union has transformed their organizational performance, reducing the average time to fund a home equity loan by 61% and increasing the number of loans that each underwriter handles by 71%. By modeling, analyzing, and improving their existing processes, Elevations has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige
Tags : 
ibm, middleware, ibm blueworks live, process improvement, organizational performance, cloud, enterprise applications
    
IBM
By: IBM     Published Date: Jul 05, 2016
By modeling, analyzing, and improving their existing processes, Colorado-based, Elevations Credit Union has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. .
Tags : 
ibm, process improvement, business results, elevations credit union, ibm blueworks live, analytics, application services, networking, enterprise applications, middleware
    
IBM
By: IBM     Published Date: Nov 07, 2014
This webinar was presented by Carla Wolfe on the key tips of process, technology, and people. Learn how Blue Works came to grow with the industry and as a process business itself.
Tags : 
ibm, blueworks, process, technology, transform performances, change management, simple process, blueworks live, tribal knowledge, bpm development, coaching, process map
    
IBM
By: IBM     Published Date: Apr 08, 2015
Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige Performance Excellence Award.
Tags : 
ibm, smarter processes, elevations credit union, blueworks live, cross enterprise, engagement, culture, performance, collaboration, corporate portals, information management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter