Search Results for: Business-Continuity Financial-Services-Industry

   All     White Papers   Multimedia   IT Downloads 
21 - 30 of 8149 Matches Previous Page  |  Next Page
DigiWorld Yearbook
IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.

ComputerWeekly.com

RACQ: Audit Scare Led to Software Cost Containment Drive
Read on to analyze how one software asset management (SAM) tool empowers organizations to strategically manage, optimize and contain software costs—taking the guesswork out of understanding license positions, and enabling businesses to respond to renewals and audits promptly.

Snow Software

CW Buyers Guide To Finance and Insurance
This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

ComputerWeekly.com

The Human Factor in Security
Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.

Proofpoint, Inc.

4 Market Trends Driving Mobile Banking
Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.

HID

IT Priorities 2014: UK Europe, France and Germany
Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.

TOPICS: Windows XP | Server Appliances | Network Performance Management Software | Network Infrastructure | Networking | Smart Phones | Business Continuity Planning | Network Provisioning | Security Architectures | Storage Systems | Storage Management Services | Identity Management | Security Tokens | WAN Switches | Tablet PC | ITIL | Security Policies | WAN Switching | Security Infrastructure | Security Hardware | Network Security Appliances | Server Consolidation | Windows Server Software | Storage Virtualization | Storage Consolidation | Software Implementation | Business Process Automation | Ethernet Networks | Mobile Middleware | Mobile Payments | Social Computing | Vulnerability Management | Software as a Service | Storage Security | Server Virtualization | Storage Appliances | Mobile Device Management | Mobile Device Management Software | Storage Virtualization Software | Storage Resource Management Software | Network Configuration Management | Storage Spending | Risk Assessment | Security Threats | Security Spending | Compliance Best Practices | Mobile CRM | Security Industry | Security Best Practices | Data Center Consolidation | Server Provisioning | Security Event Management | Software Virtualization | Workforce Management Software | Storage Switches | Security Managers | Cloud Computing | Desktop Virtualization | Data Center Networking | Data Loss Prevention (DLP) | Green Data Center | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Data Deduplication | Green Storage | Platform as a service | Hybrid clouds | Data Analytics | Windows 7 | Cloud CRM | Cloud Security | Cloud Storage | Infrastructure as a Service (IaaS) | Private Cloud | Public Cloud | Backup for Virtualized Servers | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Cloud Management | Cloud Backup | Cloud Archive | Cloud Storage Services | Cloud Disaster Recovery | Cloud Storage Strategy | Backup Server Hardware | Data Centers | Network Monitoring Software | CRM Software | Budgeting | Business Intelligence | Database Management Software | Backup Software | Backups | ERP Software | Disaster Recovery | WAN | Network Architectures | Tape Backups | Security Systems | NAS Software | Network Processors | Office Suites | Video Services | Server Software | NAS | Network Appliances | Storage Architectures | Business Process Management | ERP | Mobile Workers | CRM | Network Management | Storage Management | Outsourcing | Risk Management | Security | Network Security | Security Management | Security Audits | Application Development | Testing | Hardware | Server Hardware | Networking Hardware | Remote Access Hardware | Network Security Hardware | Videoconferencing Hardware | WAN Hardware | Storage Hardware | Storage Media | Storage Devices | Software | Security Standards | Videoconferencing Software | Security Software | Network Security Software | Supply Chain Software | Storage Management Software | Network Operating Systems | Windows | WLAN | Videoconferencing Services
ComputerWeekly.com

ISG Outsourcing Index (EMEA)
The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.

ComputerWeekly.com

Information Security Breaches Survey 2013
Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.

ComputerWeekly.com

Computer Weekly: Counting the Real Cost of Financial Cyber Crime
In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

ComputerWeekly.com

Budgeting, Planning And Forecasting For Banks
Today's banking climate is tumultuous; tight margins, industry consolidation and compliance demands, the added complexity of FinTech competition, digital innovation and changing consumer demographics. Learn about industry-specific solutions that can help you automate reporting, modernize budgeting and more.

Tagetik Software
21 - 30 of 8149 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement