Vertical Industries  >   Financial Services Industry  >  

Mortgage Banking

RSS Feed    Add to Google    Add to My Yahoo!
Mortgage Banking White Papers (View All Report Types)
 
Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Millennial Disruption and the Planning Dysfunction at Banks
sponsored by Tagetik Software
WHITE PAPER: This white paper explores how to prepare for a new customer and new competition in the banking industry: the rise of millennials and FinTech. Uncover 5 ways to plan for millennial disruption with a unified corporate performance management platform.
Posted: 10 May 2017 | Published: 10 May 2017

Tagetik Software

10 Capabilities of Global Finance Management Systems
sponsored by Infor
WHITE PAPER: Discover 10 key capabilities that can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the challenges of expanding your business globally.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

Infor

The Future of Model Risk Management for Financial Services Firms
sponsored by SAS
WHITE PAPER: This white paper covers the current state of model risk management (MRM) for financial firms, as well as posits some ideas about what the future of financial modeling is going to look like. Inside you'll learn about the impact that new regulatory developments for banks has had on MRM, 5 important new features of modeling technology, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

How to Combat Cyber-Risk Using Data Analytics
sponsored by SAS
WHITE PAPER: This report identifies the scope of the cyber-risk faced today in the financial services industry. Uncover statistics, case studies, and key actions to mitigate threats.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SAS

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act
sponsored by Ecora Software
WHITE PAPER: New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

Accelerating Speed to Market & Creating Trust in the Cloud
sponsored by Adapt Services
WHITE PAPER: This white paper provides an overview of cloud adoption strategies, using the financial services sector as an example. Uncover market statistics and perspectives from cloud users.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Adapt Services

How Financial Firms Can Improve Business Integration Capabilities and Increase Straight-Through Processing Efficiency
sponsored by Sterling Commerce, An IBM Company
WHITE PAPER: This white paper discusses the increased demand placed on financial services organizations to improve their straight-through processing (STP) levels across all business units.
Posted: 11 Sep 2009 | Published: 01 Sep 2009

Sterling Commerce, An IBM Company

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement