• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

credit

Results 51 - 75 of 243Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics
    
IBM
By: Cornerstone OnDemand     Published Date: Feb 24, 2011
GECU has the challenge of operating within one of the nation's most highly regulated industries, and as a result, has long understood that efficient processes for employee training, development and performance management are critical pillars for supporting long-term financial growth within a strict regulatory and compliance environment. Read more to find out why GECU chose Cornerstone OnDemand.
Tags : 
cornerstone, gecu, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
By: Kofax     Published Date: Sep 08, 2011
See how some retail banks have redirected their focus to a more customer -centric approach. This whitepaper includes success stories from Banco Inversis and GMAC Commercial Mortgage Corporation (now Ally Financial) which highlight how Kofax has helped them maintain and even increase their competitive edge.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
By: Business.com     Published Date: Oct 09, 2012
Paying with credit cards will help increase the consumer's want to buy and help increase the company's sales; however accepting credit cards isn't quite as easy as it seems.
Tags : 
credit cards, credit, processing, business, fees
    
Business.com
By: Business.com     Published Date: Oct 09, 2012
Credit cards are an integral part of modern business. Even customers who don't use credit will want to use debit or gift cards based around similar technology.
Tags : 
credit card, processing, credit card terminal, business technology, electronics
    
Business.com
By: Freedom Debt Relief     Published Date: Dec 22, 2010
Uncovering the truth: the real differences, pros, cons of options for consumers in serious debt
Tags : 
debt, debt relief, debt settlement, debt problems, money problems, bankruptcy, credit counseling, consumer debt, financial problems
    
Freedom Debt Relief
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
By: First Advantage     Published Date: Apr 17, 2018
DEI Communities, based in Omaha, Nebraska, manages apartment communities throughout the central United States. With a healthy portfolio of more than 9,400 units, the company has always placed a high priority on pre-lease applicant screening, which includes a basic criminal background check, eviction check and credit check on all applicants. A few years ago, however, it learned a valuable lesson – that not all screening providers are created equal. After switching to a new provider– First Advantage Resident Screening–the company discovered some impressive benefits, including better data, more streamlined processes, greater reporting flexibility, reduced bad debt and higher efficiency overall.
Tags : 
    
First Advantage
By: First Advantage     Published Date: May 01, 2018
DEI Communities, based in Omaha, Nebraska, manages apartment communities throughout the central United States. With a healthy portfolio of more than 9,400 units, the company has always placed a high priority on pre-lease applicant screening, which includes a basic criminal background check, eviction check and credit check on all applicants. A few years ago, however, it learned a valuable lesson – that not all screening providers are created equal. After switching to a new provider– First Advantage Resident Screening–the company discovered some impressive benefits, including better data, more streamlined processes, greater reporting flexibility, reduced bad debt and higher efficiency overall.
Tags : 
    
First Advantage
By: Dell EMC     Published Date: Nov 19, 2015
Read this whitepaper to learn how to make better credit worthiness decisions in less time.
Tags : 
    
Dell EMC
By: Dell EMC     Published Date: Aug 17, 2017
In a market where compute and storage resources can be bought on demand with a credit card, vendors of on-premises hardware are seeking to tip the scales in their favor with ‘cloud-like’ pricing models that eliminate the need to commit capital to new platforms. At Dell EMC World in May, Dell Financial Services (DFS) rolled out Cloud Flex for HCI (hyperconverged infrastructure), part of the company’s push to evangelize the start-small-and-scale-up virtues of HCI technology. Cloud Flex lets customers acquire equipment on an all-opex basis, with no up-front product cost, steady monthly payments that reduce by up to 30% annually, and the ability to turn in equipment any time after 12 months without penalty. It’s part of a series of moves by Dell EMC meant to ease the financial risk of sticking with on-premises infrastructure in a cloud-enabled world
Tags : 
storage resources, hyperconverged appliance, hyperconverged infrastructure, cloud, cloud pricing model
    
Dell EMC
By: SAS     Published Date: Nov 16, 2018
More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Tags : 
    
SAS
By: BMC ASEAN     Published Date: Dec 18, 2018
DevOps is fast becoming a core competency required to gain competitive advantage. At its most basic level, DevOps is a team approach to drive agile modern application development and operations to deliver high quality critical digital business services. Cloud services are fundamentally changing the way applications are developed. The near ubiquitous, lowfriction access to cloud computing for developers, who can literally access powerful computing resources at the touch of a keystroke or swipe of a credit card, has fundamentally altered the software development lifecycle (SDLC).
Tags : 
    
BMC ASEAN
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Cartera Commerce     Published Date: Mar 21, 2012
For many local merchants, offers linked to consumer credit/debit cards let you optimize your overall marketing program. Download the eBook and understand the new way for local business to attract new customers-and keep them.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network, rewards, card-linking, card-linked, cardlinked, card-linked offers, card-linked deals, card-linked marketing, card-linked advertising, small business marketing, loyalty program, customer retention, deals
    
Cartera Commerce
By: E-SignLive by Silanis     Published Date: Sep 30, 2013
Accelerating the Move to a Strong Online and Mobile Offering For credit unions, offering members a digital and mobile banking experience has never been more accessible. This 29-page ebook shows you how to use electronic signature technology to improve the member experience (both in-branch and online), improve regulatory compliance and compete with big banks.
Tags : 
credit union, banking, banking technology
    
E-SignLive by Silanis
By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security, compliance
    
Rapid7
By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : 
liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens, taas, direct marketer, cissp, credit card transactions, auditing, compliance, encryption, identity management, network security appliance, password management, data protection, pci compliance
    
Liaison Technologies
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering, anti spam, anti spyware
    
Trend Micro SaaS
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, intrusion prevention, pci compliance
    
Secure Computing
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter