• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

credit

Results 101 - 125 of 243Sort Results By: Published Date | Title | Company Name
By: Key Private Bank     Published Date: Apr 05, 2018
From budgeting daily expenses to deciding a career path, attending college brings plenty of opportunities for teenagers to make the right—and wrong—financial decisions. That’s why parents of college-bound children should utilize opportunities to instill money and wealth preservation lessons in their children. But knowing where to start can be daunting. The experts at Key Private Bank have narrowed down the best ways to help you discuss important money lessons with your teens, so that you can set your children up for a lifetime of financial success. Read about the four wealth lessons you can start introducing to your children now when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
financial responsibility, college money management, managing your money in college, college money tips, college spending tips, how can students spend money wisely, save money in college, budgeting in college, budgeting college students, personal finances for college students, credit cards and college, student loans, college loans, managing student loans, monthly budget for college students, savings accounts for students, spending habits of college students, better spending habits in college, money management for students, college cash management
    
Key Private Bank
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
By: Epicor     Published Date: Jun 06, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people-intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
    
Epicor
By: DocStar     Published Date: Jun 11, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
    
DocStar
By: IBM     Published Date: Apr 08, 2015
Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige Performance Excellence Award.
Tags : 
ibm, smarter processes, elevations credit union, blueworks live, cross enterprise, engagement, culture, performance, collaboration, corporate portals, information management
    
IBM
By: IBM     Published Date: Mar 31, 2016
"Colorado-based, Elevations Credit Union has transformed their organizational performance, reducing the average time to fund a home equity loan by 61% and increasing the number of loans that each underwriter handles by 71%. By modeling, analyzing, and improving their existing processes, Elevations has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige
Tags : 
ibm, middleware, ibm blueworks live, process improvement, organizational performance, cloud, enterprise applications
    
IBM
By: IBM     Published Date: Jul 05, 2016
By modeling, analyzing, and improving their existing processes, Colorado-based, Elevations Credit Union has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. .
Tags : 
ibm, process improvement, business results, elevations credit union, ibm blueworks live, analytics, application services, networking, enterprise applications, middleware
    
IBM
By: IBM     Published Date: Jul 05, 2016
By modeling, analyzing, and improving their existing processes, Colorado-based, Elevations Credit Union has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. .
Tags : 
ibm, process improvement, business results, elevations credit union, ibm blueworks live, analytics, application services, networking, enterprise applications, middleware
    
IBM
By: IBM     Published Date: Nov 07, 2014
This webinar was presented by Carla Wolfe on the key tips of process, technology, and people. Learn how Blue Works came to grow with the industry and as a process business itself.
Tags : 
ibm, blueworks, process, technology, transform performances, change management, simple process, blueworks live, tribal knowledge, bpm development, coaching, process map
    
IBM
By: IBM     Published Date: Feb 09, 2015
This webinar was presented by Carla Wolfe on the key tips of process, technology, and people. Learn how Blue Works came to grow with the industry and as a process business itself.
Tags : 
ibm, blueworks, blueworks live, transform performances, process management, it management, knowledge management, enterprise applications
    
IBM
By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
NexGen
By: IBM     Published Date: Aug 21, 2008
In highly competitive markets, technologies that save time and money earn top consideration. Until now, XML Web Services, often touted for their ability to create business value, has been left off the short list for implementation. In this case study you’ll see how RouteOne LLC redefined the credit application process for automobile dealers and their customers using XML Web Services technologies.
Tags : 
xml, web services, ibm, ibm mi, ibm grm, software development
    
IBM
By: Mirador     Published Date: Jul 18, 2016
Over the last several years, marketplace lenders have popped up to fill this significant gap between small business borrowers and access to credit. They typically offer fast approval turn-around – delivering requested funds in hours or days vs. weeks.
Tags : 
    
Mirador
By: Box     Published Date: Jan 16, 2015
BridgePay Network Solutions is a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Founded in 2011, BridgePay is a transaction gateway company that offers a full suite of payment products that enhance the security and performance of point-of-sale data as it races between merchants and banks.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
Box
By: Workday     Published Date: Nov 03, 2017
The CIPD is the professional body for HR and people development. The not-for-profit organisation champions better work and working lives and has been setting the benchmark for excellence in people and organisation development for more than 100 years. It has more than 140,000 members across the world, provides thought leadership through independent research on the world of work, and offers professional training and accreditation for those working in HR and learning and development.
Tags : 
    
Workday
By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services don’t offer – with no benefit deductible or service co-pay.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
By: Datamyx     Published Date: Aug 11, 2016
Here’s what you need to know about prescreening with Deluxe Marketing Services. With prescreening, you’ll be able to identify consumers who match your credit qualifications AND are likely interested in your loan product -- so you can reach out with your best offer. No more wasting campaign dollars on people who are neither qualified nor interested in a loan right now.
Tags : 
deluxe, prescreening, lending, credit, loan
    
Datamyx
By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
By: UpClick     Published Date: Mar 01, 2011
Intelligently routing credit cards to the right financial institutions in order to decrease declines 60+%
Tags : 
transactions, credit cards, financial institutions, decline rates, capturing sales, online purchases, acquirers, merchants, banks
    
UpClick
By: Equinix     Published Date: Sep 28, 2015
Interconnected Commerce: A Revolution in Value Creation, commissioned by Equinix and produced by Aite Group, discusses the state of the global payments ecosystem and its evolution into a core component of commerce enablement.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends, payment processers, payment ecosystem, disruptive payments, third party payments, location based advertising, credit cards, debit cards, apple pay, google pay, contactless payments, mobile payments, mobile wallets
    
Equinix
By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : 
internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management
    
Symantec
By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : 
spoofing, phishing, identity theft, lax website, cybercrime, norton, security
    
Symantec
By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation, application security, auditing, internet security, security management, web service security
    
Iovation
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter