Business of Information Technology  >   Business Management  >   Financial Management  >   Auditing (Finance)  >  

Financial Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Financial Compliance White Papers (View All Report Types)
 
The Importance of Data Analysis When Optimizing Guidewire
sponsored by Infogix
WHITE PAPER: In this white paper you will discover a data quality system that can help your organization ensure consistency, accuracy and most importantly, visibility into the health of your data controls.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Infogix

Aggravation or Aggregation: Risk Data and Compliance
sponsored by SAS
WHITE PAPER: Access this survey now to uncover best practices that your bank may use as a guide in formulating a response to comply with BCBS 239 principles. Read on to learn more.
Posted: 14 Oct 2015 | Published: 31 Dec 2014

SAS

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell and VMware
WHITE PAPER: Discover how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps and find out how you can strengthen data protection and help prevent loss, improve regulatory compliance, secure and optimize branch offices by enable business mobility, and more.
Posted: 02 Jun 2016 | Published: 03 May 2016

Dell and VMware

Fundamental Review of the Trading Book Standardised Model Approach From SASĀ®
sponsored by SAS
WHITE PAPER: The new standardized model from The Fundamental Review of the Trading Book (FRTB) will have a massive impact on all financial institutions, and is already creating compliance challenges. Uncover an innovative, cost-effective route to improving data quality and gaining regulatory compliance. Discover the technology that will simplify implementation.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

SAS

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Compliance Guide: Ensure Social Media Compliance Across Your Organization
sponsored by Hootsuite
WHITE PAPER: Whether you're in the financial, medical, or other industry, there are unique regulatory and legal requirements to consider when interacting on social media. In this informative resource, learn how a social relationship platform can help you manage all the areas of social media compliance,
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Hootsuite

Building Relationship Capital: Client Relationship Management for the Capital Markets
sponsored by Pivotal CRM, a CDC Software solution
WHITE PAPER: Current market trends in investment banking research demand a rapid, sophisticated response, not just in terms of corporate strategy, but in the technologies to support these strategic moves. Learn how CRM technology helps capital-markets firms streamline investment-banking activities, increase brokerage trade volume and meet compliance challenges.
Posted: 25 Jan 2011 | Published: 24 Jan 2011

Pivotal CRM, a CDC Software solution

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement