• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

financial services

Results 376 - 400 of 519Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce, business management
    
IBM
By: SAS     Published Date: Mar 06, 2018
These emerging technologies and solutions certainly are not unique to financial services. But Stewart, a business director of security intelligence solutions within the SAS Security Intelligence Practice, sees particular interest and application in AML circles. "There remain a good number of manual processes within financial crimes departments in financial institutions, and AI can help automate some of those rote tasks such as document review or alert triage," he says. "Due to investments in technology, there is a lower barrier of entry for midsized institutions. "And finally, there's this anxiety over the unknown - those risks they are not able to detect, that may be hidden using traditional techniques - so they're hoping that more advanced, unsupervised learning techniques can be used to identify those edge cases or behaviors that are out of norm." In an interview about analytics and the AML paradigm shift, Stewart discusses: • The new industry intrigue with artificial intelligence a
Tags : 
    
SAS
By: BlackBerry     Published Date: Apr 13, 2010
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, law, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones, wireless security
    
BlackBerry
By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software
    
BlackBerry
By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management, security, compliance, microsoft exchange
    
Intermedia
By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk, application security, auditing, internet security, network security appliance, security management, web service security
    
Iovation
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel
By: IBM     Published Date: Mar 04, 2014
Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.
Tags : 
business operations, business process management, bpm, process automation, smarter process, banking, financial services, business process automation, corporate portals, document management, information management, records management, search and retrieval, search engines, business activity monitoring, business analytics, content management system
    
IBM
By: Intacct     Published Date: Sep 09, 2014
The professional services market is back—and more competitive than ever. How will you outperform your competitors? By monitoring the financial metrics that matter. Through years of thorough research, Service Performance Insight has analyzed and identified the profit-centric measures that are highly correlated with financial success in professional services. Download the white paper, "The 5 KPIs that Matter for Professional Services," to learn: • The importance and primary characteristics of financial maturity. • The 5 financial metrics critical to service organizations. • Where successful service organizations fall in these metrics.
Tags : 
financial success, profit, professional services, manufacturing
    
Intacct
By: Oracle Social Cloud     Published Date: Jan 14, 2015
Social media allows consumers to be empowered in a brand new way, forcing organizations to change the way they traditionally do business. With unprecedented access to unstructured and structured data, companies have more information about the customer’s entire lifecycle than ever before.
Tags : 
customer experience, chief digital officer, digital, social marketing, social intelligence, cmo, oracle, research, cio, marketing and it collaboration, crm, social business, socially enabled enterprise, cpg, travel, healthcare, financial services, marketing cloud
    
Oracle Social Cloud
By: Adobe     Published Date: Nov 05, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : 
adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate, customer engagement, online marketing
    
Adobe
By: Telx     Published Date: Mar 22, 2016
For many midsize companies, the Cloud may not seem error-proof due to a growing list of challenges—technical, financial, and personnel. So, how can IT pros today deliver on the value of Cloud services and applications, while mitigating these resource constraints?
Tags : 
cloud, services, applications, it management, knowledge management, mobile computing, mobile data systems, wireless communications, cloud computing
    
Telx
By: MaritzCX     Published Date: Nov 29, 2016
Learn and recognize the five signs that your financial customer is becoming a customer prospect. This paper will teach you the characteristics of customer prospects, how to win back and identify at-risk customers, identify patterns and predictive behaviors, and how to use your CX data to help you retain your customers.
Tags : 
maritzcx, cx strategies, customer experience, financial services, customer prospect
    
MaritzCX
By: IBM     Published Date: Sep 11, 2013
Learn how to compete in a consumer-empowered economy by gaining a better understanding of markets, customers, channels, products, competitors, suppliers, employees, and more
Tags : 
analytics, big data, financial services, consumer-empowered economy, markets, channels, products, competitors, suppliers, employees
    
IBM
By: IBM     Published Date: Nov 12, 2013
Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.
Tags : 
business operations, business process management, bpm, process automation, smarter process, banking, financial services, business process automation, corporate portals, document management, information management, records management, search and retrieval, search engines
    
IBM
By: IBM     Published Date: Oct 31, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
cyber security, it intelligence, financial services index, security services
    
IBM
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, financial services, application security, mobile computing, mobile data systems, mobile workers, business intelligence, web service management
    
IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android, iphone, regulatory compliance, networking, security
    
IBM MaaS360
By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM
By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
ibm, security, web fraud, malware, cybercrime, cyber security, knowledge management, enterprise applications
    
IBM
By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications
    
IBM
By: IBM     Published Date: Oct 03, 2017
The demand for new data about customers, customer behaviour, product usage, asset performance, and operational processes is growing rapidly. Almost every industry wants new data. Some examples of this are: • Financial services organisations want more data to improve risk decisions, for ‘Know Your Customer (KYC) compliance and for a 360 degree view of financial crime. • Utilities companies want smart meter data to give them deeper understanding of customer and grid usage and to allow them to exploit pricing elasticity. They also want sensor data to monitor grid health, to optimise field service and manage assets. Download now to learn more!
Tags : 
scaling data, big data, customer behavior, product usage, data integration
    
IBM
By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement
    
Zycus
By: SilverSky     Published Date: May 09, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.
Tags : 
silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity, security infrastructure, compliance, business requirements, information security, networking, security, it management
    
SilverSky
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter