Vertical Industries  >  

Financial Industry

RSS Feed    Add to Google    Add to My Yahoo!
Financial Industry White Papers (View All Report Types)
 
Financial Services: Increase Conversion Rates with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: Customer identity and access management offers customers a fast and easy way to identify themselves and share permission-based information. Discover how this strategy can empower financial services companies to capture and qualify more leads, balance customer privacy with personalized user experiences, and more.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

Gigya

The Importance of Financial Management for Ecommerce
sponsored by Sage (UK) Limited
WHITE PAPER: Will your ecommerce strategy support new growth? And if so, do you have a successful ecommerce storefront backed by a powerful financial management system? Access this white paper to find out the answers to these questions and more. Discover how optimizing your financial management can help your ecommerce strategy succeed in a competitive market.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

Sage (UK) Limited

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

Using Classification to Manage Email Policy for the Enterprise
sponsored by TITUS
WHITE PAPER: Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.
Posted: 09 Nov 2007 | Published: 01 Jan 2006

TITUS

Top 4 Emerging Mobile App Strategies
sponsored by Magnet
WHITE PAPER: This e-book digs into the top 4 emerging mobile app strategies for 2016 that can help you win customer loyalty. Rely on this guide as your "cheat sheet" to enabling better mobile experiences for today's always on-the-go customers.
Posted: 18 Dec 2015 | Published: 18 Dec 2015


Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Get Global. Get Specialized. Or Get Out.
sponsored by IBM Line of Business
WHITE PAPER: This paper from IBM explores strategies that can help you capitalize on the opportunities globalization will bring about.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

IBM Line of Business

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement