• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

credit

Results 201 - 225 of 253Sort Results By: Published Date | Title | Company Name
By: Q2 eBanking     Published Date: Sep 06, 2017
The Q2 Platform and our other solutions bring these benefits to the back offices of banks and credit unions, and allow institutions to take digital banking to its full potential.
Tags : 
    
Q2 eBanking
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
6-Nines is a standard benefit of being our customer. That’s why this is a cost-nothing, do-nothing different guarantee. • Applicable on all models and configurations • Automatic on new arrays and on existing arrays with a support renewal • Guaranteed for as long as the product is supported HPE InfoSight monitors your uptime and if you experience less than 99.9999% availability, we’ll work with you to resolve the issue and provide support credit(s) at no cost
Tags : 
    
Hewlett Packard Enterprise
By: FICO EMEA     Published Date: Jan 25, 2019
Communications service providers (CSPs) have long recognized the potential of data analytics. Yet their early efforts to pull actionable intelligence from the oceans of data they have access to were largely unsuccessful. Many tried a 'big bang' approach to building a central repository without knowing what they wanted to do with the data in it. The arrival of artificial intelligence (AI) – its machine learning subset in particular – has changed their thinking and approach. For this Quick Insights report, we surveyed 64 professionals from CSPs around the world who are applying, leveraging and/ or planning to deploy advanced analytics in some capacity at various points across the customer lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
By: FICO     Published Date: May 11, 2017
In saturated, contested telecom markets, credit origination has become a strategically important capability in acquiring and retaining the right mix of customers. Being quick and adept at making enormously complex decisions — involving product bundle eligibility and pricing, deposits, credit limits, device financing rates and terms — has far-reaching effects beyond market share and current revenue.
Tags : 
customer experience, customer experience, customer engagement, consumer credit, credit, customer interaction service, customer satisfaction, customer service
    
FICO
By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA
By: Ephesoft     Published Date: Jan 18, 2018
Financial services companies can improve customer service and their bottom line by automating document intensive processes with banking, such as new account openings, mortgage, investing, credit cards, insurance, and personal, small business and commercial financial services. Learn how to make a substantial impact in terms of efficiency and cost savings for your organization with intelligent document capture technology.
Tags : 
extraction, validation, exporting, delivery, cloud, cost reduction, security
    
Ephesoft
By: AdRoll     Published Date: Jul 11, 2017
Nothing is more top of mind for marketers than attribution. It’s a complex topic, and there are lots of questions. Should you measure only the first click, or the last click? Should you also measure views? Should you combine view measurement with click measurement? How long should you wait to give credit to user activity? In this whitepaper, we examine the history of attribution models and dive deep into AdRoll platform data, third-party research, and advertiser survey data to make the case for marketers to adopt a blended attribution model, one that combines both ad views and clicks. Attribution is critical to marketing success because nothing has a bigger influence on evaluating results than how you measure the impact of your advertising. And in the digital paradigm, almost everything is measurable. When we surveyed our customers, we heard this point loud and clear. Of the 1,050 marketers we spoke to in our 2016 State of the Industry Report, 84% believe attribution is critical or ver
Tags : 
attribution, adroll, performance marketing, advertising
    
AdRoll
By: Fiserv     Published Date: Mar 02, 2018
Don’t Let Non-Compliance Fines Impact your Bottom Line and Reputation. Manual reconciliation of vast amounts of data is an arduous process, involving countless staff hours that includes backtracking, often ending without an audit trail to demonstrate how the balance sheet was derived. Automated processes offer a solution to this risk-laden adventure. In the white paper, The Buried Costs and Hidden Risks of Manual Reconciliation for Financial Institutions, learn how to calculate and compare the costs of a manual system versus an automated system. Tags: manual reconciliation, automated reconciliation for banks, automated reconciliation for credit unions, automated reconciliation, automated reconciliation for financial institutions, automated reconciliation system, non-compliance, data reconciliation
Tags : 
manual reconciliation, automated reconciliation for banks, automated reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv
By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
By: Zooz Payments     Published Date: Nov 27, 2015
Learn how international online shoppers prefer to complete their purchases. Understand how to offer the most compelling payment method to the largest international markets.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments, risk management
    
Zooz Payments
By: Zooz Payments     Published Date: Feb 11, 2016
This comprehensive eBook reviews the merchant’s top considerations before implementing a payments system.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments, risk management
    
Zooz Payments
By: Zooz Payments     Published Date: Nov 27, 2015
This ebook explores the connectivity and integration costs of managing a wide range of preferred payment methods and guides you through the hidden consumer costs and foreign exchange fees.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments, risk management
    
Zooz Payments
By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems, business analytics, business intelligence, business management, business process management
    
SAS
By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether we’re talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
By: Fiserv     Published Date: Oct 27, 2017
" The Impact of CECL and Financial Institution Readiness When it comes to CECL compliance, top financial consultants agree that extensive amounts of historical data, including different lengths of portfolio histories, will be needed. In addition, this research reveals that a majority of financial institutions do not understand how their risk management methodology needs to change. Nor do they comprehend the impacts of the changes that will need to be made to calculate Allowance for Loan and Lease Losses (ALLL). This represents a significant opportunity for top-tier consultancies to provide valuable thought leadership and guidance now, before financial institutions find themselves scrambling to meet the new standard. Learn more in our survey results."
Tags : 
cecl compliance, cecl consulting, allowance for loan loss calculator, fasb, cecl, current expected credit loss, alco, reserve, alll, allowance for loan and lease loss, loan segmentation, loan pooling credit loss trends, loan reserve
    
Fiserv
By: Comdata     Published Date: Jul 05, 2017
If you are involved in purchasing or financial decision-making for your company, you have likely heard the excitement surrounding virtual credit cards (also known as electronic or epayables) over the last few years. The payment industry is moving increasingly towards paperless vendor payments, and it is important to understand how they can benefit your business and what to look for in a virtual payment provider as you research solutions for your business.
Tags : 
    
Comdata
By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection, identity theft, pci compliance
    
LaGarde
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
By: FICO     Published Date: Dec 04, 2017
As consumers, we’re all having more experiences that seem almost magical: You’re in a mall when suddenly your smartphone beeps. It’s an offer for 20% off a pair of shoes you’ve been looking at online — from the store you just walked past! As business people, we know it’s not magic, but rather analytics powering these outstanding customer experiences. Analytics have evolved to the point where they answer an expanding range of useful questions. But understanding the different types of analytics – descriptive, diagnostic, predictive and prescriptive - and how to use them in your business can be challenging. Download the eBook to learn about the least understood – yet most powerful – tool in the analytic arsenal. Prescriptive analytics enable you to estimate and compare the likely outcomes of any number of actions, and choose the very best action to advance business objectives. Getting there isn’t as difficult as you think. Start your journey. Download the eBook today.
Tags : 
profits, analytics, credit, social, media, services, customer, consumers
    
FICO
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter